General

  • Target

    73e97aae0b577925ebb87eb53ace204b48a76bfa077544849565c80206f81423

  • Size

    756KB

  • Sample

    221124-ehebesff64

  • MD5

    c04f578bb9e6a6b68d72454a41c8ea2c

  • SHA1

    97d0a71d7c39d08bbc6e792c224a8fdf0fad67e5

  • SHA256

    73e97aae0b577925ebb87eb53ace204b48a76bfa077544849565c80206f81423

  • SHA512

    f1da2ad07db65da01e77b5a91f8cd6aa0b0ec81ae7415971378c800c631db73a607408289a33ef33cd9d59a38b0fbcd759b9ae06967b61a199470d36f3b50e0b

  • SSDEEP

    12288:d9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hy:3Z1xuVVjfFoynPaVBUR8f+kN10EBY

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

darcomet.no-ip.org:1604

Mutex

DC_MUTEX-3JZ0M76

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ddu7GHa2uc3m

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      73e97aae0b577925ebb87eb53ace204b48a76bfa077544849565c80206f81423

    • Size

      756KB

    • MD5

      c04f578bb9e6a6b68d72454a41c8ea2c

    • SHA1

      97d0a71d7c39d08bbc6e792c224a8fdf0fad67e5

    • SHA256

      73e97aae0b577925ebb87eb53ace204b48a76bfa077544849565c80206f81423

    • SHA512

      f1da2ad07db65da01e77b5a91f8cd6aa0b0ec81ae7415971378c800c631db73a607408289a33ef33cd9d59a38b0fbcd759b9ae06967b61a199470d36f3b50e0b

    • SSDEEP

      12288:d9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hy:3Z1xuVVjfFoynPaVBUR8f+kN10EBY

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks