General

  • Target

    logger.exe

  • Size

    659KB

  • Sample

    230915-rdspgafb63

  • MD5

    60ebe2937796ecd5c14c4bbb1663de20

  • SHA1

    1696ee15de1667bb58e46838446aca457ac5c48c

  • SHA256

    22a3fd6f009576f4ef519c5cd268134fd25dcb642406509762e36c08f5265d5f

  • SHA512

    129cc6e686a12ed20a9968acd05bc7f0da5c6e55b31a41f70e1b3351af43c1e879ba0a6c766e456bdf2d44cfc11ecf3774dafd351d6e8214cae6ca24e6c82d0f

  • SSDEEP

    12288:G9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hv:iZ1xuVVjfFoynPaVBUR8f+kN10EBV

Malware Config

Extracted

Family

darkcomet

C2

snowy.ddns.net:80

Mutex

DC_MUTEX-ANWWFCY

Attributes
  • InstallPath

    \CloudService\cloud.exe

  • gencode

    02Yt75CfAaPW

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      logger.exe

    • Size

      659KB

    • MD5

      60ebe2937796ecd5c14c4bbb1663de20

    • SHA1

      1696ee15de1667bb58e46838446aca457ac5c48c

    • SHA256

      22a3fd6f009576f4ef519c5cd268134fd25dcb642406509762e36c08f5265d5f

    • SHA512

      129cc6e686a12ed20a9968acd05bc7f0da5c6e55b31a41f70e1b3351af43c1e879ba0a6c766e456bdf2d44cfc11ecf3774dafd351d6e8214cae6ca24e6c82d0f

    • SSDEEP

      12288:G9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hv:iZ1xuVVjfFoynPaVBUR8f+kN10EBV

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks