General

  • Target

    aec5792af7af331e9f4202eac9bffec4949315426d5664b4bec4b92ef9d852ce

  • Size

    3.3MB

  • Sample

    221128-gjyskaef5y

  • MD5

    33cfb8a961ff5d36d4ccaa08a6c62d65

  • SHA1

    530dd18398d48e0976561e4a0b099e7f20f05ec6

  • SHA256

    aec5792af7af331e9f4202eac9bffec4949315426d5664b4bec4b92ef9d852ce

  • SHA512

    87ee7154b678715fe1f669e1cff8b570eccccda6e5ebb0b21dcbc6202aab1eaff3eb0c0f5b38153f8f848f17596afd6b58e79b8415459c7c3ac90e59119f8b5c

  • SSDEEP

    49152:gFpRSE2HtYhiLeCCEbaOWhxbgGzH97Z4a3syCyyIPo:cRSxHtWYCEbaOWhxbgy7tsnco

Malware Config

Extracted

Family

darkcomet

Botnet

Hardcore

C2

darkcometi.no-ip.biz:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    oLPNrCVEbNtk

  • install

    false

  • offline_keylogger

    true

  • password

    topfun3814

  • persistence

    false

Targets

    • Target

      aec5792af7af331e9f4202eac9bffec4949315426d5664b4bec4b92ef9d852ce

    • Size

      3.3MB

    • MD5

      33cfb8a961ff5d36d4ccaa08a6c62d65

    • SHA1

      530dd18398d48e0976561e4a0b099e7f20f05ec6

    • SHA256

      aec5792af7af331e9f4202eac9bffec4949315426d5664b4bec4b92ef9d852ce

    • SHA512

      87ee7154b678715fe1f669e1cff8b570eccccda6e5ebb0b21dcbc6202aab1eaff3eb0c0f5b38153f8f848f17596afd6b58e79b8415459c7c3ac90e59119f8b5c

    • SSDEEP

      49152:gFpRSE2HtYhiLeCCEbaOWhxbgGzH97Z4a3syCyyIPo:cRSxHtWYCEbaOWhxbgy7tsnco

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks