General

  • Target

    2abeee8718f57cf5318197003550909d.exe

  • Size

    1.4MB

  • Sample

    230315-tqsakseb84

  • MD5

    2abeee8718f57cf5318197003550909d

  • SHA1

    9e4662401cc01283eb03ad9b79a52b02713963fb

  • SHA256

    5d7f6ab4f324bfaa347af5917a59a9b633f4dd891a96870235c6509fb9e7b5d4

  • SHA512

    4897d94a4263451890e060a5488570c889dbd54e55fe9f4dc8c8ce00739ecf696392d9534d4f534370c59c073d496e0e5afac985cfb12b3c5d5e2a11523b06d8

  • SSDEEP

    24576:tVrEOG6glVYeR74l7UiAHbdgSMs3hn3x2VpuDJGhuNKx/la60x:ttE16gLYK7BBHMox2buDYQQh060x

Malware Config

Extracted

Family

darkcomet

Botnet

luxygt

C2

dartkom22.ddns.net:2009

Mutex

DCMIN_MUTEX-UT0S86Q

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    fT1b0Py34wS5

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      2abeee8718f57cf5318197003550909d.exe

    • Size

      1.4MB

    • MD5

      2abeee8718f57cf5318197003550909d

    • SHA1

      9e4662401cc01283eb03ad9b79a52b02713963fb

    • SHA256

      5d7f6ab4f324bfaa347af5917a59a9b633f4dd891a96870235c6509fb9e7b5d4

    • SHA512

      4897d94a4263451890e060a5488570c889dbd54e55fe9f4dc8c8ce00739ecf696392d9534d4f534370c59c073d496e0e5afac985cfb12b3c5d5e2a11523b06d8

    • SSDEEP

      24576:tVrEOG6glVYeR74l7UiAHbdgSMs3hn3x2VpuDJGhuNKx/la60x:ttE16gLYK7BBHMox2buDYQQh060x

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

2
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks