General

  • Target

    c8b0cc09763b5168e41a187d1437c81934dbf8dfc08f57aff0d0516c93860eae

  • Size

    406KB

  • Sample

    221126-21s9mabg35

  • MD5

    102efc2dd38871d71cd3930bacca6274

  • SHA1

    b8163edb8f989d6eefaf3fc5a603f5251691f5f8

  • SHA256

    c8b0cc09763b5168e41a187d1437c81934dbf8dfc08f57aff0d0516c93860eae

  • SHA512

    bbc3367a2aa06c529d5dbe2860b659606a6433554011abe0a4011543432cac5ad21a18a92377cc2609c7b0bbd4203620034f64d159ec924453f027d0469d88e3

  • SSDEEP

    6144:mcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37uwww0JwwmSnvYqm9nxLW0Bs/kw:mcW7KEZlPzCy37p2L

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.0.103:1604

Mutex

DC_MUTEX-KQHPF2S

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    lyoggkBoDnrh

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      c8b0cc09763b5168e41a187d1437c81934dbf8dfc08f57aff0d0516c93860eae

    • Size

      406KB

    • MD5

      102efc2dd38871d71cd3930bacca6274

    • SHA1

      b8163edb8f989d6eefaf3fc5a603f5251691f5f8

    • SHA256

      c8b0cc09763b5168e41a187d1437c81934dbf8dfc08f57aff0d0516c93860eae

    • SHA512

      bbc3367a2aa06c529d5dbe2860b659606a6433554011abe0a4011543432cac5ad21a18a92377cc2609c7b0bbd4203620034f64d159ec924453f027d0469d88e3

    • SSDEEP

      6144:mcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37uwww0JwwmSnvYqm9nxLW0Bs/kw:mcW7KEZlPzCy37p2L

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

8
T1112

Disabling Security Tools

2
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks