General

  • Target

    e6d7ca18087a13b366c3a044bf54d642a0a46ff77dd19114db8bf7990c0bd24e

  • Size

    1.0MB

  • Sample

    221130-ykgzwada8t

  • MD5

    daf490df6a5fcb1ac47bdc6d5f235f70

  • SHA1

    d8449c14407703a7194089f567173e6827fd3f69

  • SHA256

    e6d7ca18087a13b366c3a044bf54d642a0a46ff77dd19114db8bf7990c0bd24e

  • SHA512

    18e100806fe229acee93e200e6c10fb6fb07ec9b8323a9e7753fca59eaf4e5f97b017a28c956339b98b3fe0ce25e10a2f962d5cdcbc05231e45983f184bb6fe5

  • SSDEEP

    24576:QqtjXbJKN77OhLQ8Qxc8PrzeXb9qa39IS3wx9G9UG+v:XxX4N7YbpErzObH39Iau9G9UR

Malware Config

Extracted

Family

darkcomet

Botnet

YoDc

C2

robttt.zapto.org:912

Mutex

DC_MUTEX-BP5TXBD

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    3W7x0fxttgsw

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    rundll32

Targets

    • Target

      e6d7ca18087a13b366c3a044bf54d642a0a46ff77dd19114db8bf7990c0bd24e

    • Size

      1.0MB

    • MD5

      daf490df6a5fcb1ac47bdc6d5f235f70

    • SHA1

      d8449c14407703a7194089f567173e6827fd3f69

    • SHA256

      e6d7ca18087a13b366c3a044bf54d642a0a46ff77dd19114db8bf7990c0bd24e

    • SHA512

      18e100806fe229acee93e200e6c10fb6fb07ec9b8323a9e7753fca59eaf4e5f97b017a28c956339b98b3fe0ce25e10a2f962d5cdcbc05231e45983f184bb6fe5

    • SSDEEP

      24576:QqtjXbJKN77OhLQ8Qxc8PrzeXb9qa39IS3wx9G9UG+v:XxX4N7YbpErzObH39Iau9G9UR

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks