General

  • Target

    5ab49a8cbeef6d8e5d3d4261500db2f777184b62336fdf0c293f3d0205e2d983

  • Size

    699KB

  • Sample

    221128-bhn9vacg47

  • MD5

    d89d42c4b35422d886920d2e299f75c3

  • SHA1

    8199dbef1e1a6e016f535ae2e464b0c9d52d8000

  • SHA256

    5ab49a8cbeef6d8e5d3d4261500db2f777184b62336fdf0c293f3d0205e2d983

  • SHA512

    95e10b82bb60810b34ae3a26e839f7f0964eea43d3351784892dc2e15e2c56f4183c3afafcbbb589b0b62f0bd892a22f1b58627a7754b17834e96319ed8e8752

  • SSDEEP

    12288:TmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyFr9HMeF:TBIGkbxqEcjsWiDxguehC2Swj

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

46.172.124.11:25565

Mutex

DC_MUTEX-4RH9W5R

Attributes
  • InstallPath

    svchost.exe

  • gencode

    4XPrawLvdpZr

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    �������

Targets

    • Target

      5ab49a8cbeef6d8e5d3d4261500db2f777184b62336fdf0c293f3d0205e2d983

    • Size

      699KB

    • MD5

      d89d42c4b35422d886920d2e299f75c3

    • SHA1

      8199dbef1e1a6e016f535ae2e464b0c9d52d8000

    • SHA256

      5ab49a8cbeef6d8e5d3d4261500db2f777184b62336fdf0c293f3d0205e2d983

    • SHA512

      95e10b82bb60810b34ae3a26e839f7f0964eea43d3351784892dc2e15e2c56f4183c3afafcbbb589b0b62f0bd892a22f1b58627a7754b17834e96319ed8e8752

    • SSDEEP

      12288:TmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyFr9HMeF:TBIGkbxqEcjsWiDxguehC2Swj

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Detect Neshta payload

    • Modifies WinLogon for persistence

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks