General

  • Target

    24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812

  • Size

    1018KB

  • Sample

    221127-l9lcdadc7z

  • MD5

    c3d2964b0ab7ec164f9170b7e576af3c

  • SHA1

    9222f6cb173ca783bddea4060a8423b984f9dbc4

  • SHA256

    24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812

  • SHA512

    7f56c5c42366d928cd56fe1197de7aed7d1b97d7ef042da347c00e79ed01204c6a7ab1225b31b519ba575f75fc1bf16610c487021f66e765900e6cad2e0c6b2c

  • SSDEEP

    12288:1naOGRGKGJcyCi0vQFDxyXN8jTE3bWYwntqiNpI5vykGexM9WK:1naRGDJcy6vQsCfKCYwntqiNuwkvC9WK

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

radyom.duckdns.org:1604

Mutex

DC_MUTEX-WJQYLQF

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    fKsi9oKEtUJS

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812

    • Size

      1018KB

    • MD5

      c3d2964b0ab7ec164f9170b7e576af3c

    • SHA1

      9222f6cb173ca783bddea4060a8423b984f9dbc4

    • SHA256

      24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812

    • SHA512

      7f56c5c42366d928cd56fe1197de7aed7d1b97d7ef042da347c00e79ed01204c6a7ab1225b31b519ba575f75fc1bf16610c487021f66e765900e6cad2e0c6b2c

    • SSDEEP

      12288:1naOGRGKGJcyCi0vQFDxyXN8jTE3bWYwntqiNpI5vykGexM9WK:1naRGDJcy6vQsCfKCYwntqiNuwkvC9WK

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks