General

  • Target

    89f3bc10ad7748145c44f746066f152f6ccf05e3511c2bfa5873dddc00a03aa6

  • Size

    723KB

  • Sample

    221126-dff7kabc61

  • MD5

    b25bd71e8613309be7244bfa481251a3

  • SHA1

    c1a3de591c2fd1eb0e3e48ea605682e05944ff64

  • SHA256

    89f3bc10ad7748145c44f746066f152f6ccf05e3511c2bfa5873dddc00a03aa6

  • SHA512

    8b711da64fdfd0185fff31afb54bdce3b14c2fd8a6e282ee7a28728d69c899fb6bbf815ef10380cf85389fdf0e28bdf30633c0e05ac7a90d14694cf43ac3c118

  • SSDEEP

    12288:4a9qf8JfWTEa2uD/hCknCwpxKUHolNuPNcz6wNUKW4ZM+MJyXmEG:4awk6Ea2/kCSYYAN+czrUK3DG

Malware Config

Extracted

Family

darkcomet

Botnet

DOS

C2

85.93.52.232:1604

Mutex

DC_MUTEX-HJF80AB

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    lFGSk0NKV6by

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      89f3bc10ad7748145c44f746066f152f6ccf05e3511c2bfa5873dddc00a03aa6

    • Size

      723KB

    • MD5

      b25bd71e8613309be7244bfa481251a3

    • SHA1

      c1a3de591c2fd1eb0e3e48ea605682e05944ff64

    • SHA256

      89f3bc10ad7748145c44f746066f152f6ccf05e3511c2bfa5873dddc00a03aa6

    • SHA512

      8b711da64fdfd0185fff31afb54bdce3b14c2fd8a6e282ee7a28728d69c899fb6bbf815ef10380cf85389fdf0e28bdf30633c0e05ac7a90d14694cf43ac3c118

    • SSDEEP

      12288:4a9qf8JfWTEa2uD/hCknCwpxKUHolNuPNcz6wNUKW4ZM+MJyXmEG:4awk6Ea2/kCSYYAN+czrUK3DG

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Detect Neshta payload

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks