General

  • Target

    3fa712fa1f5fd57eeceaadfe61e4caa9

  • Size

    691KB

  • Sample

    240104-ctl5asheb9

  • MD5

    3fa712fa1f5fd57eeceaadfe61e4caa9

  • SHA1

    2c34c4c3ee37493af7e130023c69dbc6829b0cff

  • SHA256

    4055f66b00029901a2c4d135c126185bbabf7393e06e24b4fbc183cfce4406ec

  • SHA512

    b8ef4a5f96ca3f99e2acb15f7e0d70b3d0e1a9f02875a6c15df760ef934a4589a04db7e409f359d594d579df4bf57cca75d5b66f61fbfb99704e42f98063eb9d

  • SSDEEP

    12288:wxeC6+2dW+m5XwneFYCMFY7vEwYadHT/VGyE4Q661qlVoULVsBu:kQ8we/AYiadHMa61qlVsU

Malware Config

Extracted

Family

darkcomet

Botnet

Slaves

C2

ratrololol.no-ip.biz:1604

Mutex

DC_MUTEX-4TN56C8

Attributes
  • gencode

    eoH57CKDnAQ1

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      3fa712fa1f5fd57eeceaadfe61e4caa9

    • Size

      691KB

    • MD5

      3fa712fa1f5fd57eeceaadfe61e4caa9

    • SHA1

      2c34c4c3ee37493af7e130023c69dbc6829b0cff

    • SHA256

      4055f66b00029901a2c4d135c126185bbabf7393e06e24b4fbc183cfce4406ec

    • SHA512

      b8ef4a5f96ca3f99e2acb15f7e0d70b3d0e1a9f02875a6c15df760ef934a4589a04db7e409f359d594d579df4bf57cca75d5b66f61fbfb99704e42f98063eb9d

    • SSDEEP

      12288:wxeC6+2dW+m5XwneFYCMFY7vEwYadHT/VGyE4Q661qlVoULVsBu:kQ8we/AYiadHMa61qlVsU

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Tasks