General

  • Target

    easy_Malicious_1d633454ba93c82fc30283b10875645a40b0ec307978820130931a79ea034d85.exe

  • Size

    251KB

  • Sample

    230704-sraaqagc3t

  • MD5

    1ee7ecf2c037b06b319e563c0737079c

  • SHA1

    1b8d2fc198e091cb6cb332c4fa81805a31125fb4

  • SHA256

    4f6ee8709795773b693c8bc81888f7c55866323ffa3aabd6dd3c3c9bbcf2fd87

  • SHA512

    8705d7c44213345f39f1ae1fe27c0d0d184b0042b7931f036960b44bda958946401849269095db66b659f9ab6a5277ff69ef9781ad1cde75b8f531084e7518a6

  • SSDEEP

    6144:4cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL370:4cW7KEZlPzCy370

Malware Config

Extracted

Family

darkcomet

Botnet

Pb

C2

drakensang.hopto.org:1604

Mutex

DC_MUTEX-2X8ZAXH

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Y6tiTpMHNnJ6

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      easy_Malicious_1d633454ba93c82fc30283b10875645a40b0ec307978820130931a79ea034d85.exe

    • Size

      251KB

    • MD5

      1ee7ecf2c037b06b319e563c0737079c

    • SHA1

      1b8d2fc198e091cb6cb332c4fa81805a31125fb4

    • SHA256

      4f6ee8709795773b693c8bc81888f7c55866323ffa3aabd6dd3c3c9bbcf2fd87

    • SHA512

      8705d7c44213345f39f1ae1fe27c0d0d184b0042b7931f036960b44bda958946401849269095db66b659f9ab6a5277ff69ef9781ad1cde75b8f531084e7518a6

    • SSDEEP

      6144:4cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL370:4cW7KEZlPzCy370

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks