General

  • Target

    aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a

  • Size

    1011KB

  • Sample

    221205-lfchdafb79

  • MD5

    cd250f5388b3ac78ee05b78ef319fa08

  • SHA1

    f5122750ebb2ff6e0bf52fd771c055035e6ea3c3

  • SHA256

    aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a

  • SHA512

    60df8792fd320cd8c47699ca9a098d298aaa607073c1770d7859ee73fa0943e0427c0b2e39cbaa6bb4f11f7b0a0ddf831a74ed584ddc5ee0362b8eb51bcafb10

  • SSDEEP

    24576:0vOTggIRfmQX3zRYC6FVZPv+FWe4Ys/E:AjYlDZ3+UT/E

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

idonthackyou.no-ip.biz:1604

Mutex

DC_MUTEX-21N6LQV

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    mhEuDRor0FUH

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a

    • Size

      1011KB

    • MD5

      cd250f5388b3ac78ee05b78ef319fa08

    • SHA1

      f5122750ebb2ff6e0bf52fd771c055035e6ea3c3

    • SHA256

      aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a

    • SHA512

      60df8792fd320cd8c47699ca9a098d298aaa607073c1770d7859ee73fa0943e0427c0b2e39cbaa6bb4f11f7b0a0ddf831a74ed584ddc5ee0362b8eb51bcafb10

    • SSDEEP

      24576:0vOTggIRfmQX3zRYC6FVZPv+FWe4Ys/E:AjYlDZ3+UT/E

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks