General

  • Target

    NEAS.bc64e423e73460f223693097d456d920.exe

  • Size

    658KB

  • Sample

    231031-kkn7asac3x

  • MD5

    bc64e423e73460f223693097d456d920

  • SHA1

    966579a9b8981e9316738b60a7dace44ab055179

  • SHA256

    a60e516a11b7f8d030cd393e2ea4e6d4b25fc0cf7b5bdf1a4353eaae28c81e99

  • SHA512

    24ca0b49f1c5b476651dd8fd865aef40acaafa7410e1e51cc98477d2e3f25154cc827af3b5228bd8f04abe64591675afc36a116d084794b01ae047f04f9c07c9

  • SSDEEP

    12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hO:eZ1xuVVjfFoynPaVBUR8f+kN10EBQ

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

slexqq.duckdns.org:1604

Mutex

DC_MUTEX-TH3JT6M

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    jorWB3wvZUMQ

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      NEAS.bc64e423e73460f223693097d456d920.exe

    • Size

      658KB

    • MD5

      bc64e423e73460f223693097d456d920

    • SHA1

      966579a9b8981e9316738b60a7dace44ab055179

    • SHA256

      a60e516a11b7f8d030cd393e2ea4e6d4b25fc0cf7b5bdf1a4353eaae28c81e99

    • SHA512

      24ca0b49f1c5b476651dd8fd865aef40acaafa7410e1e51cc98477d2e3f25154cc827af3b5228bd8f04abe64591675afc36a116d084794b01ae047f04f9c07c9

    • SSDEEP

      12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hO:eZ1xuVVjfFoynPaVBUR8f+kN10EBQ

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks