General

  • Target

    0a3eb0e960fe681f9c9c087866e452fea90ea01b6be8546f18a193877684e2c4

  • Size

    3.6MB

  • Sample

    240313-vzss5scg38

  • MD5

    2cc5fe892456803c78acb4533131cfd0

  • SHA1

    fb784a69b211a211cc37216ef0fab175b3fcb17b

  • SHA256

    0a3eb0e960fe681f9c9c087866e452fea90ea01b6be8546f18a193877684e2c4

  • SHA512

    dd7f18aa36ab5f6ec3e0f36a340a5e14f769594ba9b64c597f69741b85e8c0ef8d9f486bc58d29ae6339752223b3495a99a892150876ce728837caf779faa3b1

  • SSDEEP

    98304:6yfTJdwh2D/v2m/x494+JIUqKGEv+4UvAvmO1Sqw:Yh2L2UcNJjGE5eO

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

bhanufuckingkajal.zapto.org:1604

Mutex

DC_MUTEX-51BCPDY

Attributes
  • gencode

    cs3uXQkGvRRY

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Extracted

Family

latentbot

C2

bhanufuckingkajal.zapto.org

Targets

    • Target

      0a3eb0e960fe681f9c9c087866e452fea90ea01b6be8546f18a193877684e2c4

    • Size

      3.6MB

    • MD5

      2cc5fe892456803c78acb4533131cfd0

    • SHA1

      fb784a69b211a211cc37216ef0fab175b3fcb17b

    • SHA256

      0a3eb0e960fe681f9c9c087866e452fea90ea01b6be8546f18a193877684e2c4

    • SHA512

      dd7f18aa36ab5f6ec3e0f36a340a5e14f769594ba9b64c597f69741b85e8c0ef8d9f486bc58d29ae6339752223b3495a99a892150876ce728837caf779faa3b1

    • SSDEEP

      98304:6yfTJdwh2D/v2m/x494+JIUqKGEv+4UvAvmO1Sqw:Yh2L2UcNJjGE5eO

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Detects executables built or packed with MPress PE compressor

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks