General

  • Target

    easy_Malicious_11437d674ae999699d76a94ad6291e86b49e471796329b2b0b0c95383de53b89.exe

  • Size

    252KB

  • Sample

    230704-sq7jtsgc21

  • MD5

    f13a40d8d558bd757e05dd5d15f8a37c

  • SHA1

    dd7794c67fbc193ff893bb1731bcffd913cc76b6

  • SHA256

    769be62d4b8b47b83ae43e57c2d5c43bc76224d9a97c67f9c14bd0d93f16a697

  • SHA512

    837e0e6305e18ab56d07e28e7194f7adca702fe028a0739f16ecdb2ef530f70d8e0ed14d93b0e22ce6d97b98bb177c652553b683cb40252274e5da3968901f6b

  • SSDEEP

    6144:ucNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL370i:ucW7KEZlPzCy373

Malware Config

Extracted

Family

darkcomet

Botnet

All

C2

192.168.0.104.:1604

192.168.0.104.:81

Mutex

DC_MUTEX-3XRDSKA

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    LQ4BCG6oBTFR

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      easy_Malicious_11437d674ae999699d76a94ad6291e86b49e471796329b2b0b0c95383de53b89.exe

    • Size

      252KB

    • MD5

      f13a40d8d558bd757e05dd5d15f8a37c

    • SHA1

      dd7794c67fbc193ff893bb1731bcffd913cc76b6

    • SHA256

      769be62d4b8b47b83ae43e57c2d5c43bc76224d9a97c67f9c14bd0d93f16a697

    • SHA512

      837e0e6305e18ab56d07e28e7194f7adca702fe028a0739f16ecdb2ef530f70d8e0ed14d93b0e22ce6d97b98bb177c652553b683cb40252274e5da3968901f6b

    • SSDEEP

      6144:ucNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL370i:ucW7KEZlPzCy373

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

2
T1089

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks