General

  • Target

    c263c6ec2efd2f2a0960ccf96cf2411725b7a103e77453f15884a05cd3e70903

  • Size

    348KB

  • Sample

    221126-dfbbbaga37

  • MD5

    2e7130bb2600fa3254f989686291ca82

  • SHA1

    8fd254baece9ef350af8599903f6a6fd318c8892

  • SHA256

    c263c6ec2efd2f2a0960ccf96cf2411725b7a103e77453f15884a05cd3e70903

  • SHA512

    66b7cc7df44b1910232568058a87f2cf6aae947ec74414b17a0f8034397db2a81ba275129f142a28166f70fa1590cbfb129df158303fab75cbdaffb53a5fe8a1

  • SSDEEP

    6144:k9+feVjBpeExgVTFSXFoMc5RhCaL373S/M7PLwcNYS996KFR:5ZlPzCy37qcccW7Kr

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

85.93.52.232:1604

Mutex

DC_MUTEX-585DVYU

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    rYstcY1qwB8J

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      c263c6ec2efd2f2a0960ccf96cf2411725b7a103e77453f15884a05cd3e70903

    • Size

      348KB

    • MD5

      2e7130bb2600fa3254f989686291ca82

    • SHA1

      8fd254baece9ef350af8599903f6a6fd318c8892

    • SHA256

      c263c6ec2efd2f2a0960ccf96cf2411725b7a103e77453f15884a05cd3e70903

    • SHA512

      66b7cc7df44b1910232568058a87f2cf6aae947ec74414b17a0f8034397db2a81ba275129f142a28166f70fa1590cbfb129df158303fab75cbdaffb53a5fe8a1

    • SSDEEP

      6144:k9+feVjBpeExgVTFSXFoMc5RhCaL373S/M7PLwcNYS996KFR:5ZlPzCy37qcccW7Kr

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Detect Neshta payload

    • Modifies WinLogon for persistence

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks