General

  • Target

    ee913318a820c07751da4af3648b8c7adad3fcccbdece7bdebae438c710f46c8

  • Size

    760KB

  • Sample

    221123-pzgszsff71

  • MD5

    09ecb8492c8e349016b9a6ab0e9c094d

  • SHA1

    b6b2d4f5daffaf429aac1c63159197172af3ba6d

  • SHA256

    ee913318a820c07751da4af3648b8c7adad3fcccbdece7bdebae438c710f46c8

  • SHA512

    66b0c3b30ead35de86cc1c0c7090d7bdf373d7a27d0f733f8f9b9ad4f70dda2f29de9d144340681be248129ed1068f1200020c081a5f52018fb2984839eed39b

  • SSDEEP

    12288:bxWRVaJnkiulVhF/Rfgr97tBYlF/SGI4s0gqxvS:YREJkiubhv4r97tBCI4zhq

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

jhbj5bhju3d.ddns.net:1603

Mutex

DC_MUTEX-R2CE796

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    FwVvcFTb61D5

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      ee913318a820c07751da4af3648b8c7adad3fcccbdece7bdebae438c710f46c8

    • Size

      760KB

    • MD5

      09ecb8492c8e349016b9a6ab0e9c094d

    • SHA1

      b6b2d4f5daffaf429aac1c63159197172af3ba6d

    • SHA256

      ee913318a820c07751da4af3648b8c7adad3fcccbdece7bdebae438c710f46c8

    • SHA512

      66b0c3b30ead35de86cc1c0c7090d7bdf373d7a27d0f733f8f9b9ad4f70dda2f29de9d144340681be248129ed1068f1200020c081a5f52018fb2984839eed39b

    • SSDEEP

      12288:bxWRVaJnkiulVhF/Rfgr97tBYlF/SGI4s0gqxvS:YREJkiubhv4r97tBCI4zhq

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks