General

  • Target

    Dogecoin-Miner2022.exe

  • Size

    5.8MB

  • Sample

    230108-yhc8xaaa3z

  • MD5

    e72b1feb2a030b80c0c5209dbdfc6b94

  • SHA1

    bf5c2c1dc9a1f65938af801146022939216a4504

  • SHA256

    96805d4d3e908f6ecc11cd5334a78acf2f6073769b59f1a4bb0d67ef1d040365

  • SHA512

    2b0e0367afa6f6f5a7d3d0c5a45e3b7207ba22c78cc76fc2ba53cc874bbb78973765a361f593cde168218d871cd65bd290cd1c07340bcf66d11d6ac8d8f6e19a

  • SSDEEP

    98304:WHfHfHfHFH1m9kS4Wcv9PSQDBf3M3fWtUVtXHEtAYvzh:2///91m93NcvVSWVM3f8A

Malware Config

Extracted

Family

darkcomet

Botnet

@333++JAN_Code3333

C2

dgorijan20785.hopto.org:35800

Mutex

DC_MUTEX-3DU7V7J

Attributes
  • InstallPath

    winrars.exe

  • gencode

    Wv1Q34JHUltQ

  • install

    true

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    false

  • reg_key

    winrar

Extracted

Family

darkcomet

Botnet

New-July-July4-01

C2

dgorijan20785.hopto.org:35800

Mutex

DC_MUTEX-U4BEN1Z

Attributes
  • gencode

    8sAQdbHcGDto

  • install

    false

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    false

Extracted

Family

warzonerat

C2

45.74.4.244:5199

dgorijan20785.hopto.org:5199

Extracted

Family

darkcomet

Botnet

New-July-July4-0

C2

45.74.4.244:35800

Mutex

DC_MUTEX-RT27KF0

Attributes
  • gencode

    cKUHbX2GsGhs

  • install

    false

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    false

Extracted

Family

asyncrat

Version

0.5.6A

C2

45.74.4.244:6606

45.74.4.244:7707

45.74.4.244:8808

Mutex

servtle284

Attributes
  • delay

    5

  • install

    true

  • install_file

    wintskl.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

darkcomet

Botnet

@1++Dec_Code1

C2

dgorijan20785.hopto.org:35800

Mutex

DC_MUTEX-QKTE9F0

Attributes
  • gencode

    mHPyGzxUU6he

  • install

    false

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    false

Targets

    • Target

      Dogecoin-Miner2022.exe

    • Size

      5.8MB

    • MD5

      e72b1feb2a030b80c0c5209dbdfc6b94

    • SHA1

      bf5c2c1dc9a1f65938af801146022939216a4504

    • SHA256

      96805d4d3e908f6ecc11cd5334a78acf2f6073769b59f1a4bb0d67ef1d040365

    • SHA512

      2b0e0367afa6f6f5a7d3d0c5a45e3b7207ba22c78cc76fc2ba53cc874bbb78973765a361f593cde168218d871cd65bd290cd1c07340bcf66d11d6ac8d8f6e19a

    • SSDEEP

      98304:WHfHfHfHFH1m9kS4Wcv9PSQDBf3M3fWtUVtXHEtAYvzh:2///91m93NcvVSWVM3f8A

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Async RAT payload

    • Warzone RAT payload

    • Drops file in Drivers directory

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks