General

  • Target

    a6e7773eb25bdcbe52d364cc99742bbb

  • Size

    532KB

  • Sample

    240226-vvcw5aca9x

  • MD5

    a6e7773eb25bdcbe52d364cc99742bbb

  • SHA1

    4dc0de3a7c4f38316b84bec46a9caff4021c429e

  • SHA256

    e88f20c69ed7636fe98672d7dc922a641d734972c5e710c180a39ba827aa87d2

  • SHA512

    6b97b89fc8f980f49059bbd4a3fb6391bcb3a39ef2b7ac8e0511338bd1926b01ceea243d54dee9ba937064c5e0b8d8f4862d3f282de50085535cab0b030d4684

  • SSDEEP

    12288:ueJtpFU0HWHLCzB0VBq2r9EHAkwDsGc5hu2Vvwx95gAIl5cKDbwUHIDNppxr0:NTpJ2HL4BAq24DwAVhuvx4As5cKDbwUX

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

127.0.0.1:1604

Mutex

DCMIN_MUTEX-KTC5CHW

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    QzxTiNAFTVGZ

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      a6e7773eb25bdcbe52d364cc99742bbb

    • Size

      532KB

    • MD5

      a6e7773eb25bdcbe52d364cc99742bbb

    • SHA1

      4dc0de3a7c4f38316b84bec46a9caff4021c429e

    • SHA256

      e88f20c69ed7636fe98672d7dc922a641d734972c5e710c180a39ba827aa87d2

    • SHA512

      6b97b89fc8f980f49059bbd4a3fb6391bcb3a39ef2b7ac8e0511338bd1926b01ceea243d54dee9ba937064c5e0b8d8f4862d3f282de50085535cab0b030d4684

    • SSDEEP

      12288:ueJtpFU0HWHLCzB0VBq2r9EHAkwDsGc5hu2Vvwx95gAIl5cKDbwUHIDNppxr0:NTpJ2HL4BAq24DwAVhuvx4As5cKDbwUX

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Molebox Virtualization software

      Detects file using Molebox Virtualization software.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks