General

  • Target

    bed715e3b6e26f4fec9c7082aac2394bc7257e2f7469ac22d76eab505de457e0

  • Size

    525KB

  • Sample

    221202-snqhjahh74

  • MD5

    c4c0fee2c7cdf9a44a59f059d6a8803e

  • SHA1

    2562b366ab1188c40d12c3e2f6bca0b9099ca894

  • SHA256

    bed715e3b6e26f4fec9c7082aac2394bc7257e2f7469ac22d76eab505de457e0

  • SHA512

    19f26119f54b9d119c6b95585a5e77d5db686a82a752d26c7bebcff09d17f5f516e0f48f6b07dfc3833a762a212a68d46d12c7c0739387cfafaa94130cf2d0cf

  • SSDEEP

    12288:1f6dZ7vMihuWr7q25JiJ35Ph26p+opTn8SU+G1Dd8/aGrHCP:J6dKiJSg2++BU+QBD

Malware Config

Extracted

Family

darkcomet

Botnet

T-Unique

C2

192.168.1.36:43594

Mutex

DC_MUTEX-XGYFVZD

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    40fNn9l6Rkkp

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicrosoftUpdate

Targets

    • Target

      bed715e3b6e26f4fec9c7082aac2394bc7257e2f7469ac22d76eab505de457e0

    • Size

      525KB

    • MD5

      c4c0fee2c7cdf9a44a59f059d6a8803e

    • SHA1

      2562b366ab1188c40d12c3e2f6bca0b9099ca894

    • SHA256

      bed715e3b6e26f4fec9c7082aac2394bc7257e2f7469ac22d76eab505de457e0

    • SHA512

      19f26119f54b9d119c6b95585a5e77d5db686a82a752d26c7bebcff09d17f5f516e0f48f6b07dfc3833a762a212a68d46d12c7c0739387cfafaa94130cf2d0cf

    • SSDEEP

      12288:1f6dZ7vMihuWr7q25JiJ35Ph26p+opTn8SU+G1Dd8/aGrHCP:J6dKiJSg2++BU+QBD

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks