General

  • Target

    a16a87582b1fa805f44465fc76b97446

  • Size

    827KB

  • Sample

    231227-d526bshgf7

  • MD5

    a16a87582b1fa805f44465fc76b97446

  • SHA1

    41af022e92e97254399fd36d68acc845526e4452

  • SHA256

    aade5180b671a74055e5e24f6068c88169fdbdb393d621560613d35b25d6ac85

  • SHA512

    f3fc79f4da694c0212d6919a8e3c4d8e0dc2eb88afb8b0e6a3a1234cf6d2b5385fee8a804f9cb5b437b38cee08e72a2e0eee3f254d540dc127614a48293fe87d

  • SSDEEP

    12288:Y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/xL:MZ1xuVVjfFoynPaVBUR8f+kN10Edx

Malware Config

Extracted

Family

darkcomet

Botnet

kingraider

C2

gta5menu.no-ip.biz:101

Mutex

DC_MUTEX-W1JXX8X

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    174XWToCVXoX

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      a16a87582b1fa805f44465fc76b97446

    • Size

      827KB

    • MD5

      a16a87582b1fa805f44465fc76b97446

    • SHA1

      41af022e92e97254399fd36d68acc845526e4452

    • SHA256

      aade5180b671a74055e5e24f6068c88169fdbdb393d621560613d35b25d6ac85

    • SHA512

      f3fc79f4da694c0212d6919a8e3c4d8e0dc2eb88afb8b0e6a3a1234cf6d2b5385fee8a804f9cb5b437b38cee08e72a2e0eee3f254d540dc127614a48293fe87d

    • SSDEEP

      12288:Y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/xL:MZ1xuVVjfFoynPaVBUR8f+kN10Edx

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks