General

  • Target

    61b7e04d9d3a6cd1505f5451590728cd4be52bae18a372fff3d34df35d3731df

  • Size

    1.5MB

  • Sample

    221123-vks6cshc66

  • MD5

    36fad7754d42bc13817f7f80db692f5a

  • SHA1

    3123f62956f4840ff7599eb1c606c3a212de1c9d

  • SHA256

    61b7e04d9d3a6cd1505f5451590728cd4be52bae18a372fff3d34df35d3731df

  • SHA512

    a6cafce6d9ae93689127dbfcd1bf6ba91c0a90a558966114253a68a7aff59592cd2c6e3abe3efefcfa3d256872ea8785d28372f1ad445bc82171d4739d3e6628

  • SSDEEP

    24576:TILc7jgHwZ2VfT1fUgjhGUb6bz+1q7v4n4uEyEZWu2c5wUECjYrwfoz1pouE5hZD:kLGWwef5FhSbaqhlBv6PC8wfi1k5k6WE

Malware Config

Extracted

Family

darkcomet

Botnet

Crypto Bot

C2

estherr.no-ip.biz:5604

Mutex

DC_MUTEX-4P0JZTL

Attributes
  • gencode

    x1lNFj9h0ysn

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      Crypto Trading Bot.exe

    • Size

      5.0MB

    • MD5

      9580c6ee0ec3d08c29020c0dbff23cfa

    • SHA1

      4f8ee5461fe1300e42bfb62747597ed6e339ff29

    • SHA256

      8b06f2e6daad66479102faa65ba46b40d5cd6e3335cf3902971dcd753b37d347

    • SHA512

      491aef0102cbd7d9816b79dac6673607119bc7778c0e1564dc5e60dea6ca265530771fe7855843126fe9322871d50e52aab210984951571468a90805f0bf2f79

    • SSDEEP

      24576:57xgtwBETvT1r+gjhgMp6RZ+XI7vkb4u+yEZEWkc5wiOCjIlwfo915SQEtxZiQWT:36wwv5nh4RWIhltp67CMwfe1+tKSM5

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Process Discovery

1
T1057

Tasks