General

  • Target

    Exploit.exe

  • Size

    796KB

  • Sample

    230829-kwp8qsbe68

  • MD5

    88544faee260aede61c03af6edd43236

  • SHA1

    9b5a8fcd6961a832ee22317a9eac1699e3174fb4

  • SHA256

    a6f6ab5e7f05cbec8868a845a471f758e8f8498f6981fa287526bafcadd80f1f

  • SHA512

    09ea4923c401c81cc8800b4868c33ebf27a9ac603eb5703a778e329f87d40bbdef7edf4f8650894802a0279e639f647b556792a6dc856eb85d951eee4e80fcf5

  • SSDEEP

    12288:orJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h2b/9HFJ4:o1xuVVjfFoynPaVBUR8f+kN10EB41s

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-0GMGVTE

Attributes
  • InstallPath

    Java\msdcsc.exe

  • gencode

    loY0Hi6SPKca

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    Java_update

Targets

    • Target

      Exploit.exe

    • Size

      796KB

    • MD5

      88544faee260aede61c03af6edd43236

    • SHA1

      9b5a8fcd6961a832ee22317a9eac1699e3174fb4

    • SHA256

      a6f6ab5e7f05cbec8868a845a471f758e8f8498f6981fa287526bafcadd80f1f

    • SHA512

      09ea4923c401c81cc8800b4868c33ebf27a9ac603eb5703a778e329f87d40bbdef7edf4f8650894802a0279e639f647b556792a6dc856eb85d951eee4e80fcf5

    • SSDEEP

      12288:orJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h2b/9HFJ4:o1xuVVjfFoynPaVBUR8f+kN10EB41s

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Detect Neshta payload

    • Modifies WinLogon for persistence

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

3
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks