General

  • Target

    sadas.exe

  • Size

    16.8MB

  • Sample

    230507-k9a1zaff5t

  • MD5

    f9a55560038242c706758751e9302bd2

  • SHA1

    c5bb064e8f036cc70108c2b0cb1e9488fb73150c

  • SHA256

    058ff8110878fc7ff4641d3140c5c8a82e4942c0a13f45fddacd3849ace87937

  • SHA512

    3a16e98796d4eceb56e40ad414a592da01a0a6ea95b08b9597abb0352e71d24f12538a7a9cf3f7c8b093eb194a6a920f46069ce3bbfc62db8bc1f2cdbad1f824

  • SSDEEP

    49152:ZSxJNXkjgHYz2XwVbeO/jI2BfExZfgs2bKDCt2WawvjBZS5pRdi6yS91aDZk+E9u:p

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

mercandos45.duckdns.org:1604

Mutex

DC_MUTEX-GSWE1VH

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    biDFouPD9qjS

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      sadas.exe

    • Size

      16.8MB

    • MD5

      f9a55560038242c706758751e9302bd2

    • SHA1

      c5bb064e8f036cc70108c2b0cb1e9488fb73150c

    • SHA256

      058ff8110878fc7ff4641d3140c5c8a82e4942c0a13f45fddacd3849ace87937

    • SHA512

      3a16e98796d4eceb56e40ad414a592da01a0a6ea95b08b9597abb0352e71d24f12538a7a9cf3f7c8b093eb194a6a920f46069ce3bbfc62db8bc1f2cdbad1f824

    • SSDEEP

      49152:ZSxJNXkjgHYz2XwVbeO/jI2BfExZfgs2bKDCt2WawvjBZS5pRdi6yS91aDZk+E9u:p

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks