General

  • Target

    c2b9789afd8ef5c0d52b89acd6979206b4afd2857e81a8e1fe1583cb3248d903

  • Size

    1.4MB

  • Sample

    221204-dn4ylafe6x

  • MD5

    963fcbc4e17e12ed311ebafd76c308b7

  • SHA1

    094d1280d925811e88ee511e75dcef95d977d4fd

  • SHA256

    c2b9789afd8ef5c0d52b89acd6979206b4afd2857e81a8e1fe1583cb3248d903

  • SHA512

    01a0a8f6674574bd1cb3b71d194285ec968e25594c5bebe4de55c023dd4f9ef46f45330162eda251e62842148d08312b8465c6b50d49f2a332743b43e010d65f

  • SSDEEP

    24576:xUP/y4LAuYTJkkhas4G3nJvvQMOHIvtThAECEXNj8ASgnSjDQizcROqxGZ:Mq4LAv1kk8zk5OuNhAECkNigSvbPqU

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

thailandhack.no-ip.org:83

Mutex

DC_MUTEX-KT2FTNQ

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    vt9w2l6Dosvn

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      c2b9789afd8ef5c0d52b89acd6979206b4afd2857e81a8e1fe1583cb3248d903

    • Size

      1.4MB

    • MD5

      963fcbc4e17e12ed311ebafd76c308b7

    • SHA1

      094d1280d925811e88ee511e75dcef95d977d4fd

    • SHA256

      c2b9789afd8ef5c0d52b89acd6979206b4afd2857e81a8e1fe1583cb3248d903

    • SHA512

      01a0a8f6674574bd1cb3b71d194285ec968e25594c5bebe4de55c023dd4f9ef46f45330162eda251e62842148d08312b8465c6b50d49f2a332743b43e010d65f

    • SSDEEP

      24576:xUP/y4LAuYTJkkhas4G3nJvvQMOHIvtThAECEXNj8ASgnSjDQizcROqxGZ:Mq4LAv1kk8zk5OuNhAECkNigSvbPqU

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Virtualization/Sandbox Evasion

1
T1497

Tasks