General

  • Target

    515c8739e2d50564c66b44bee231a44e

  • Size

    864KB

  • Sample

    240110-xrsvaaeadl

  • MD5

    515c8739e2d50564c66b44bee231a44e

  • SHA1

    80e84ad7c09a2ea07da7a58bd5eb6190e9770d75

  • SHA256

    37e14b6407dd954e97c9aa70b7ef6a1507bda4a1037bcda79a72fd20d7602576

  • SHA512

    8ee33724d97c9b29e9777ddf10b2e44384597e6488682f6c64604ff82b2c799f485d6cb24109f842f10f2a82f1b2f45e6a05c91e2581cd724cfb09cbcb3f0801

  • SSDEEP

    12288:tQqzctd6LDEjG9EP4ORTarqSBJVIjlVOeMfPA9gwJP24HMvC1IDoiEo:SL69lOlaX6jXtMQ9hJP24HMwsr/

Malware Config

Extracted

Family

darkcomet

Botnet

Slave

C2

vasilisth.no-ip.org:6106

vasilisth.no-ip.org:6061

steamc.servegame.com:6061

steamc.servegame.com:6106

steamc.servegame.com:4445

vasilisth.no-ip.org:4445

Mutex

MicrosofWindowsXPVis778Mutx

Attributes
  • gencode

    q5JNtHnx4Yyq

  • install

    false

  • offline_keylogger

    true

  • password

    hacker100~

  • persistence

    false

Targets

    • Target

      515c8739e2d50564c66b44bee231a44e

    • Size

      864KB

    • MD5

      515c8739e2d50564c66b44bee231a44e

    • SHA1

      80e84ad7c09a2ea07da7a58bd5eb6190e9770d75

    • SHA256

      37e14b6407dd954e97c9aa70b7ef6a1507bda4a1037bcda79a72fd20d7602576

    • SHA512

      8ee33724d97c9b29e9777ddf10b2e44384597e6488682f6c64604ff82b2c799f485d6cb24109f842f10f2a82f1b2f45e6a05c91e2581cd724cfb09cbcb3f0801

    • SSDEEP

      12288:tQqzctd6LDEjG9EP4ORTarqSBJVIjlVOeMfPA9gwJP24HMvC1IDoiEo:SL69lOlaX6jXtMQ9hJP24HMwsr/

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Drops startup file

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks