General

  • Target

    GORI5.exe

  • Size

    3MB

  • Sample

    230904-ewyl8adf4v

  • MD5

    82b07527bc6f9a9adbe2430797584797

  • SHA1

    7e89854829579b0b537f68690a36bb80f629da0d

  • SHA256

    2b0a7d21e0a19d275e1b9a6b357b38e610040e5597753beac81caddc7a262117

  • SHA512

    56294fef78dd1120b47d3a3535f63ea50fafd07cf2d1769712adfdb644e6ad91439b51b6ee758f78e9f1c1d5475065d867a17824086934e298f125292eeae085

  • SSDEEP

    49152:eeI6HeXz8zQvQvNx5RaWBYCH+reXtHNYWatoGNqfQzZJ1oDpOzRx:eeIseD85x5RaWBfH+re9HNYJewz

Malware Config

Extracted

Family

darkcomet

Botnet

September 2023

C2

bonding79.ddns.net:3316

goodgt79.ddns.net:3316

whatis79.ddns.net:3316

smath79.ddns.net:3316

jacknop79.ddns.net:3316

chrisle79.ddns.net:3316

Mutex

DC_MUTEX-UZKN5K0

Attributes
  • gencode

    wEEnKBEF7keh

  • install

    false

  • offline_keylogger

    true

  • password

    Password20$

  • persistence

    false

Targets

    • Target

      GORI5.exe

    • Size

      3MB

    • MD5

      82b07527bc6f9a9adbe2430797584797

    • SHA1

      7e89854829579b0b537f68690a36bb80f629da0d

    • SHA256

      2b0a7d21e0a19d275e1b9a6b357b38e610040e5597753beac81caddc7a262117

    • SHA512

      56294fef78dd1120b47d3a3535f63ea50fafd07cf2d1769712adfdb644e6ad91439b51b6ee758f78e9f1c1d5475065d867a17824086934e298f125292eeae085

    • SSDEEP

      49152:eeI6HeXz8zQvQvNx5RaWBYCH+reXtHNYWatoGNqfQzZJ1oDpOzRx:eeIseD85x5RaWBfH+re9HNYJewz

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Virtualization/Sandbox Evasion

2
T1497

Scripting

1
T1064

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Tasks