General

  • Target

    e3078669c4480cfcb40450ce0aa9e731dc32f7290b1e34081b20d29c0aca54fc

  • Size

    1.8MB

  • Sample

    221123-s7gdzadc32

  • MD5

    fb3a65252966c1987ad924dda4fda3ba

  • SHA1

    e055d2a6d84cec7aee7dfbc14630ab6ff23db358

  • SHA256

    e3078669c4480cfcb40450ce0aa9e731dc32f7290b1e34081b20d29c0aca54fc

  • SHA512

    2ff2d960d904ce0673e038812490f4bda76d85b217af4429d73ed2266d3c59a97c6380e50bf3b9260695374d0e324bfa53c24802862f65fd011c68a193907159

  • SSDEEP

    49152:bkwkn9IMHeatQcbdpKncQYT2KfhzwtaPCS:IdnVVBMcpT1J/PC

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

cfmf.no-ip.biz:2745

Mutex

DC_MUTEX-09LZQ8F

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    wyTvNlugruh6

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    syster32dll

Targets

    • Target

      e3078669c4480cfcb40450ce0aa9e731dc32f7290b1e34081b20d29c0aca54fc

    • Size

      1.8MB

    • MD5

      fb3a65252966c1987ad924dda4fda3ba

    • SHA1

      e055d2a6d84cec7aee7dfbc14630ab6ff23db358

    • SHA256

      e3078669c4480cfcb40450ce0aa9e731dc32f7290b1e34081b20d29c0aca54fc

    • SHA512

      2ff2d960d904ce0673e038812490f4bda76d85b217af4429d73ed2266d3c59a97c6380e50bf3b9260695374d0e324bfa53c24802862f65fd011c68a193907159

    • SSDEEP

      49152:bkwkn9IMHeatQcbdpKncQYT2KfhzwtaPCS:IdnVVBMcpT1J/PC

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks