General

  • Target

    894324d95e7faada875358b1267b1d5644d11c2948a99a107fdfef49c899eb75

  • Size

    1.2MB

  • Sample

    221205-cc4b9aeg34

  • MD5

    8976f3e0aff56ea29bb2cea8fc199e43

  • SHA1

    f7c707b7d1405d75b342a89d07445953b65b1724

  • SHA256

    894324d95e7faada875358b1267b1d5644d11c2948a99a107fdfef49c899eb75

  • SHA512

    19af5e522a586e4d1c398bb21d1406c701a06b15a0f467e687bcf4d33650e5cde143532722883e1dbba96511e974354a9292bfe901a4065786947b1a61a88bbd

  • SSDEEP

    12288:vZdjjz8tf5Tdxr0s6rMie0Fy1SNoiH99cM1gDcIBzKocKBEth7B6OwjfHngQRRBU:vZQM8mqJsMOG1Jc6J8U+Hjlz93

Malware Config

Extracted

Family

darkcomet

Botnet

Thomas

C2

thomaske19951.no-ip.org:2000

Mutex

DC_MUTEX-ECCAP6P

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    5wK8lbcuWlps

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      894324d95e7faada875358b1267b1d5644d11c2948a99a107fdfef49c899eb75

    • Size

      1.2MB

    • MD5

      8976f3e0aff56ea29bb2cea8fc199e43

    • SHA1

      f7c707b7d1405d75b342a89d07445953b65b1724

    • SHA256

      894324d95e7faada875358b1267b1d5644d11c2948a99a107fdfef49c899eb75

    • SHA512

      19af5e522a586e4d1c398bb21d1406c701a06b15a0f467e687bcf4d33650e5cde143532722883e1dbba96511e974354a9292bfe901a4065786947b1a61a88bbd

    • SSDEEP

      12288:vZdjjz8tf5Tdxr0s6rMie0Fy1SNoiH99cM1gDcIBzKocKBEth7B6OwjfHngQRRBU:vZQM8mqJsMOG1Jc6J8U+Hjlz93

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Scripting

1
T1064

Tasks