General

  • Target

    9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47

  • Size

    314KB

  • Sample

    221130-hh37bsfc55

  • MD5

    b885feb71421b4205b929d12fb69cdfe

  • SHA1

    17fd2f3bee766a697c6d1fd30a29dedb38d90802

  • SHA256

    9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47

  • SHA512

    d9abd7fd4ef940afa2144bfb12ea62a1f251b56aadd26205c486d95e1f0a90430180167588222666978a626d0b37bec889cc9a8a1b0b54c12683640572c03f0f

  • SSDEEP

    6144:fxL3BJf8bjtIT6XATveX9JbvJzM/hhPVhsBiR8PQL+mXA0H:5rH89I0DX/TJzM/hxVhsBiS4Bw+

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

leonkerr.no-ip.org:18752

Mutex

DC_MUTEX-BDHL2WC

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    CA2SHRhHsuSa

  • install

    true

  • offline_keylogger

    true

  • password

    s2dh2`t12

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47

    • Size

      314KB

    • MD5

      b885feb71421b4205b929d12fb69cdfe

    • SHA1

      17fd2f3bee766a697c6d1fd30a29dedb38d90802

    • SHA256

      9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47

    • SHA512

      d9abd7fd4ef940afa2144bfb12ea62a1f251b56aadd26205c486d95e1f0a90430180167588222666978a626d0b37bec889cc9a8a1b0b54c12683640572c03f0f

    • SSDEEP

      6144:fxL3BJf8bjtIT6XATveX9JbvJzM/hhPVhsBiR8PQL+mXA0H:5rH89I0DX/TJzM/hxVhsBiS4Bw+

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks