General

  • Target

    654dfcbe3130819dbe5bc66bc77417eccf506845d89b90e79db68416116675db

  • Size

    472KB

  • Sample

    221123-syaj3aff2x

  • MD5

    42a9bd3b85b9e3e8f3e1e8ad98694c5e

  • SHA1

    3226db0689459f6c95dd8fcb6618304da3afc100

  • SHA256

    654dfcbe3130819dbe5bc66bc77417eccf506845d89b90e79db68416116675db

  • SHA512

    242b2d3f47de461835a85881306ca5c346fb567057b38888627e776abed2ca2b6769becbd3459e6750894016ba6979244ab0b77ae39571350f51db692b11064c

  • SSDEEP

    12288:cAtSB52EATN4yUKScEuqeKY5Ty1Evt58Ca:ceS2N/CqY1Evt58C

Malware Config

Extracted

Family

darkcomet

Botnet

WorkHard20

C2

notice.noip.me:1290

Mutex

DC_MUTEX-LZ0MH5B

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    iByLpcNEt7H4

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Microsoft Update

Targets

    • Target

      654dfcbe3130819dbe5bc66bc77417eccf506845d89b90e79db68416116675db

    • Size

      472KB

    • MD5

      42a9bd3b85b9e3e8f3e1e8ad98694c5e

    • SHA1

      3226db0689459f6c95dd8fcb6618304da3afc100

    • SHA256

      654dfcbe3130819dbe5bc66bc77417eccf506845d89b90e79db68416116675db

    • SHA512

      242b2d3f47de461835a85881306ca5c346fb567057b38888627e776abed2ca2b6769becbd3459e6750894016ba6979244ab0b77ae39571350f51db692b11064c

    • SSDEEP

      12288:cAtSB52EATN4yUKScEuqeKY5Ty1Evt58Ca:ceS2N/CqY1Evt58C

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks