General

  • Target

    DarkNight.exe

  • Size

    3.9MB

  • Sample

    240415-3gbe5sdb9x

  • MD5

    d396e70e3da1b5c0c8414a524971b83e

  • SHA1

    928fcd454a00ec2141fa0b1966ae509235c4c6c7

  • SHA256

    b8022c1aa5f5f6220ffce8f3f473bb8078bbf171fa00e50823bc0c79946c1121

  • SHA512

    dd66a02df8456876b89fc913d4e0e3c60324cb4adb4dd4c3a39babf0a70a6f4f10eb9d610a6aa86576746e5d9e458c85fbc320b708949a164c43588c9aaf9d4b

  • SSDEEP

    98304:8O6Dchp3YEtEbfY514GcOIjRy9NcrMcLAAW8bapEUyB3pm1:8OakRObogOdDcNL08ILyu

Malware Config

Extracted

Family

darkcomet

Botnet

DN2

C2

80.93.220.228:1605

Mutex

DC_MUTEX-X39FPQJ

Attributes
  • gencode

    UxJtmrp9botj

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      DarkNight.exe

    • Size

      3.9MB

    • MD5

      d396e70e3da1b5c0c8414a524971b83e

    • SHA1

      928fcd454a00ec2141fa0b1966ae509235c4c6c7

    • SHA256

      b8022c1aa5f5f6220ffce8f3f473bb8078bbf171fa00e50823bc0c79946c1121

    • SHA512

      dd66a02df8456876b89fc913d4e0e3c60324cb4adb4dd4c3a39babf0a70a6f4f10eb9d610a6aa86576746e5d9e458c85fbc320b708949a164c43588c9aaf9d4b

    • SSDEEP

      98304:8O6Dchp3YEtEbfY514GcOIjRy9NcrMcLAAW8bapEUyB3pm1:8OakRObogOdDcNL08ILyu

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks