General

  • Target

    bf4cfb1665a1fa2ca12d9820aedf383be4f5977fa2f5c45dc104f06c55f6278b

  • Size

    667KB

  • Sample

    221123-x8zn6ahc76

  • MD5

    2fe59ff88b749df002aff9da165ff69f

  • SHA1

    c0e772c511f9d5e405cb7f35571d381447d102cb

  • SHA256

    bf4cfb1665a1fa2ca12d9820aedf383be4f5977fa2f5c45dc104f06c55f6278b

  • SHA512

    913dc85212f877c73dcbbf55ed777ccd9af898266cc877da87afbdf565ebfc1ee31aa8a1ffed3fb2f769e28027e112a5184cc029f1212e52f2ecccea1738c110

  • SSDEEP

    12288:u9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/ht:6Z1xuVVjfFoynPaVBUR8f+kN10EBD

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

unkown1337.zapto.org:444

Mutex

DC_MUTEX-FX46407

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    9ogAqtJ1PVbf

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      bf4cfb1665a1fa2ca12d9820aedf383be4f5977fa2f5c45dc104f06c55f6278b

    • Size

      667KB

    • MD5

      2fe59ff88b749df002aff9da165ff69f

    • SHA1

      c0e772c511f9d5e405cb7f35571d381447d102cb

    • SHA256

      bf4cfb1665a1fa2ca12d9820aedf383be4f5977fa2f5c45dc104f06c55f6278b

    • SHA512

      913dc85212f877c73dcbbf55ed777ccd9af898266cc877da87afbdf565ebfc1ee31aa8a1ffed3fb2f769e28027e112a5184cc029f1212e52f2ecccea1738c110

    • SSDEEP

      12288:u9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/ht:6Z1xuVVjfFoynPaVBUR8f+kN10EBD

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks