General

  • Target

    8fd837f851b5a31de2833401b38e56b54b6b43c50b3dd959058d23fbd51086f8

  • Size

    533KB

  • Sample

    221123-qy1edaac4x

  • MD5

    e76d5d56d415a1ce22645e0063ad2cec

  • SHA1

    df434abbcfcc107752d3138e45eb4ee48bea062c

  • SHA256

    8fd837f851b5a31de2833401b38e56b54b6b43c50b3dd959058d23fbd51086f8

  • SHA512

    916dfbed53cb0499b315a6ab5e3b0f4f7b0c5e0c8cb069b0049bedf79ece2a68a2b30e3eadd6bd651fe65c190fc98d0e37c70b17bca9dcf0b5a267f2a2f0ed05

  • SSDEEP

    6144:WeUTLsOGd1DA8asB2+z60iK4ksJrsSHIzTgIkyzIY9dOuo4ljuN1E8FjUfHvjj:g4OGdNA8acJ4bsSozcIkyz7RuNUvvjj

Malware Config

Extracted

Family

darkcomet

Botnet

NEWERA2

C2

coza.glory297.org:1708

Mutex

DC_MUTEX-MU5U1BZ

Attributes
  • gencode

    xydyGlW8tLZ2

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      8fd837f851b5a31de2833401b38e56b54b6b43c50b3dd959058d23fbd51086f8

    • Size

      533KB

    • MD5

      e76d5d56d415a1ce22645e0063ad2cec

    • SHA1

      df434abbcfcc107752d3138e45eb4ee48bea062c

    • SHA256

      8fd837f851b5a31de2833401b38e56b54b6b43c50b3dd959058d23fbd51086f8

    • SHA512

      916dfbed53cb0499b315a6ab5e3b0f4f7b0c5e0c8cb069b0049bedf79ece2a68a2b30e3eadd6bd651fe65c190fc98d0e37c70b17bca9dcf0b5a267f2a2f0ed05

    • SSDEEP

      6144:WeUTLsOGd1DA8asB2+z60iK4ksJrsSHIzTgIkyzIY9dOuo4ljuN1E8FjUfHvjj:g4OGdNA8acJ4bsSozcIkyz7RuNUvvjj

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks