General

  • Target

    6fsg3an241aiHcZ6Y6tN8EwqOK_OD8Kst9ngG9aGR0k.bin

  • Size

    142KB

  • Sample

    230315-npvfnaeh9z

  • MD5

    824247ace17fdb122110cf96aba85484

  • SHA1

    8b6a758d3fef912321d127c3a9da0a77af8e574e

  • SHA256

    e9fb20dda9f6e356a21dc67a63ab4df04c2a38af8e0fc2acb7d9e01bd6864749

  • SHA512

    5d1862e383e1ff21f639842dd22126480a993a31060e50e5a102a41ecdc41077f179aec105abd084354112519cd34c89676164f43114b8c589ffd66ce918c715

  • SSDEEP

    3072:d7DhdC6kzWypvaQ0FxyNTBfNU/JMQNX1j8KCOdW6m1cTxotQX:dBlkZvaF4NTB1U/JM8XaOdW6miTEQX

Malware Config

Extracted

Family

darkcomet

Botnet

Microsoft

C2

mafafa9090-59805.portmap.io:59805

Mutex

DC_MUTEX-SYYFNJW

Attributes
  • InstallPath

    Microsoft.exe

  • gencode

    PCo28LJinyik

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    Microsoft

Targets

    • Target

      6fsg3an241aiHcZ6Y6tN8EwqOK_OD8Kst9ngG9aGR0k.bin

    • Size

      142KB

    • MD5

      824247ace17fdb122110cf96aba85484

    • SHA1

      8b6a758d3fef912321d127c3a9da0a77af8e574e

    • SHA256

      e9fb20dda9f6e356a21dc67a63ab4df04c2a38af8e0fc2acb7d9e01bd6864749

    • SHA512

      5d1862e383e1ff21f639842dd22126480a993a31060e50e5a102a41ecdc41077f179aec105abd084354112519cd34c89676164f43114b8c589ffd66ce918c715

    • SSDEEP

      3072:d7DhdC6kzWypvaQ0FxyNTBfNU/JMQNX1j8KCOdW6m1cTxotQX:dBlkZvaF4NTB1U/JM8XaOdW6miTEQX

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Disabling Security Tools

3
T1089

Bypass User Account Control

1
T1088

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks