General

  • Target

    b06b7ee14bf0c8cf8ac8e69e5304328f1480fade065ce1c8c3a26fd0341b83de

  • Size

    1.6MB

  • Sample

    221128-e3zsvsag2v

  • MD5

    fb464794c924adf0e9d448f904bcbc0e

  • SHA1

    23838f0309e313efbf87ceede73c526e7d69725a

  • SHA256

    b06b7ee14bf0c8cf8ac8e69e5304328f1480fade065ce1c8c3a26fd0341b83de

  • SHA512

    9c48678ca011dd86b66e7a240edf21e7c2117e3f0cd25e3e993468c9628857c16e2d8d460bf965ae8b5037f9769b2e2f002c4ca07729d3bb12afdf859521530c

  • SSDEEP

    24576:ktb20pkaCqT5TBWgNQ7a+WLqYe39oH8y5Prv6F81MGhuKSdNz56A:NVg5tQ7a+EdH8y5PryFoduxV5

Malware Config

Extracted

Family

darkcomet

Botnet

General

C2

microsoftcorperation.ddns.net:1337

Mutex

DC_MUTEX-G0M1A4H

Attributes
  • gencode

    gLZapf5KJLR9

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      b06b7ee14bf0c8cf8ac8e69e5304328f1480fade065ce1c8c3a26fd0341b83de

    • Size

      1.6MB

    • MD5

      fb464794c924adf0e9d448f904bcbc0e

    • SHA1

      23838f0309e313efbf87ceede73c526e7d69725a

    • SHA256

      b06b7ee14bf0c8cf8ac8e69e5304328f1480fade065ce1c8c3a26fd0341b83de

    • SHA512

      9c48678ca011dd86b66e7a240edf21e7c2117e3f0cd25e3e993468c9628857c16e2d8d460bf965ae8b5037f9769b2e2f002c4ca07729d3bb12afdf859521530c

    • SSDEEP

      24576:ktb20pkaCqT5TBWgNQ7a+WLqYe39oH8y5Prv6F81MGhuKSdNz56A:NVg5tQ7a+EdH8y5PryFoduxV5

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks