General

  • Target

    a9a208068f14d6eef0d622d70fe80a4b3c42e5504559d266d17b06b92b74fde2

  • Size

    670KB

  • Sample

    221130-3ng69sad6z

  • MD5

    03270502295221b4bf9a3632f2bf66c0

  • SHA1

    267d2f598e7506d1a18f18e87e979c22eb661bfa

  • SHA256

    a9a208068f14d6eef0d622d70fe80a4b3c42e5504559d266d17b06b92b74fde2

  • SHA512

    ea0fcf2aa15316e23af00b11f731580dc71fa384b33014131180110b20bd66552728a25ebfa2ee66f8ae63c7e31cdccb5ef17ef617937070cebf6ff6b8e01a32

  • SSDEEP

    12288:4KeElqElPQGmPynqwVU+M+Rzh7rlA2zslx8KkyK+OtGE577wOyorOhCAEGpqa:4K9lVZYP1wVH7rlA2zaxZkJ+OhIOFrO1

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

127.0.0.1:1997

Mutex

DCMIN_MUTEX-EW4T4NZ

Attributes
  • gencode

    vs1vR0t4lqKv

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      a9a208068f14d6eef0d622d70fe80a4b3c42e5504559d266d17b06b92b74fde2

    • Size

      670KB

    • MD5

      03270502295221b4bf9a3632f2bf66c0

    • SHA1

      267d2f598e7506d1a18f18e87e979c22eb661bfa

    • SHA256

      a9a208068f14d6eef0d622d70fe80a4b3c42e5504559d266d17b06b92b74fde2

    • SHA512

      ea0fcf2aa15316e23af00b11f731580dc71fa384b33014131180110b20bd66552728a25ebfa2ee66f8ae63c7e31cdccb5ef17ef617937070cebf6ff6b8e01a32

    • SSDEEP

      12288:4KeElqElPQGmPynqwVU+M+Rzh7rlA2zslx8KkyK+OtGE577wOyorOhCAEGpqa:4K9lVZYP1wVH7rlA2zaxZkJ+OhIOFrO1

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Tasks