General

  • Target

    78f1d4ae12c30ca54b70aa9400f8d1d1d5d2e1e14b8ffd7959b61e50eecfc471

  • Size

    911KB

  • Sample

    221202-tnydtagg8y

  • MD5

    4bb9134eade669f1ad497b4d022da29f

  • SHA1

    46074e9c42e81452ba97459a73896628db5341ea

  • SHA256

    78f1d4ae12c30ca54b70aa9400f8d1d1d5d2e1e14b8ffd7959b61e50eecfc471

  • SHA512

    778851a0407fca8499d7048cfe03e7c475e6d7909e94f7ecf63e6328793b67e07da38b23d8d5a5fafdbba0e057333bbeff1dba5c1bc069c5c74cf0da34b2fa60

  • SSDEEP

    24576:W2O/Gl+LjtXzH4UXAPMdLkRrYFJkiD16KF8KJrUt5+Cx:yjtXzH4UXPBkrYoigKF8KlSDx

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-54FS22Q

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    G2nZxP5wXrRx

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      78f1d4ae12c30ca54b70aa9400f8d1d1d5d2e1e14b8ffd7959b61e50eecfc471

    • Size

      911KB

    • MD5

      4bb9134eade669f1ad497b4d022da29f

    • SHA1

      46074e9c42e81452ba97459a73896628db5341ea

    • SHA256

      78f1d4ae12c30ca54b70aa9400f8d1d1d5d2e1e14b8ffd7959b61e50eecfc471

    • SHA512

      778851a0407fca8499d7048cfe03e7c475e6d7909e94f7ecf63e6328793b67e07da38b23d8d5a5fafdbba0e057333bbeff1dba5c1bc069c5c74cf0da34b2fa60

    • SSDEEP

      24576:W2O/Gl+LjtXzH4UXAPMdLkRrYFJkiD16KF8KJrUt5+Cx:yjtXzH4UXPBkrYoigKF8KlSDx

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks