General

  • Target

    14579b3b387f50b241893fc4f1e25159544d88f7d907e04e7962d094ce2cb8a5

  • Size

    689KB

  • Sample

    221123-w7nptshb2t

  • MD5

    f5f4ae6b847f5e02baf94f3f0333e633

  • SHA1

    05bde2c6c15c52576e14c902353afb8e22ed587c

  • SHA256

    14579b3b387f50b241893fc4f1e25159544d88f7d907e04e7962d094ce2cb8a5

  • SHA512

    772b8743d1da6a0378efd6353e118626b0c6252c8489c6ec338c8417d74018ed40e4e4765a499ec8429c2867ddc1bf18dad9d6ae49415d57da19700a241a6583

  • SSDEEP

    12288:Id9saDxhAqrMW+vOcM3P0NKoeYmI1nn07zzOfn5+IsR4fmeC8lyEDc4i:Izs6ARW+GIKoeY9f50R4XG4i

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

unisecurity.dyndns.org:1604

Mutex

DC_MUTEX-C26Z34V

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    oWYnqqVsi0S2

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      InvoicesDetails.scr

    • Size

      1.2MB

    • MD5

      e269e2a3315742ce8a57d9ae10b6a488

    • SHA1

      97b868eef844b411f3ff324e2e7c5a4c9418d3f3

    • SHA256

      e17b7a5dc3b7a09cc45a00c1579435a4ef7863a32c48efb16030fc02b893e003

    • SHA512

      561c1dc2e4c2ce0cc838bcfd240a5b860adbc8a7136e51641d99418e0354cc4b198796b436fddb5e47ff8eb5428e32281436ee5a9167cf8790c3fa405d5b73c6

    • SSDEEP

      24576:PthEVaPqLsUvqlqma4y24SCHevZr5In++++++++++++++++++++++++++++++++S:TEVUcsUvqlqma4y24SCHevZr5In++++a

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks