General

  • Target

    a3f36a4527abd8e1bd4dcf0185d76c5b6715cbf7d02ea17c72decf5c4e42e74d

  • Size

    302KB

  • Sample

    240518-br42nade3v

  • MD5

    c612ab5b8fd7121be5de86f236165256

  • SHA1

    8ae7f79d06378c6ae313905ac81454088a9b7b8f

  • SHA256

    a3f36a4527abd8e1bd4dcf0185d76c5b6715cbf7d02ea17c72decf5c4e42e74d

  • SHA512

    b9bffc385abc999e5d3f1d3d643d4771113deb98b685f92885960a524cf5b652298274038ff441ccec7b29f536ccb17c2da051c54d8c6db569ae0b62c95d1cfe

  • SSDEEP

    6144:tljew4Hr0L0tSldQqzCXkg5dbI+YyUjI7ODNol012jW71w8:CprbtQdNC0EbPYyUj9OqZ7j

Malware Config

Extracted

Family

darkcomet

Botnet

Andrei

C2

andreibgg.sytes.net:27050

Mutex

DC_MUTEX-HGAV3Q6

Attributes
  • gencode

    S0X2ru4blbmE

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      a3f36a4527abd8e1bd4dcf0185d76c5b6715cbf7d02ea17c72decf5c4e42e74d

    • Size

      302KB

    • MD5

      c612ab5b8fd7121be5de86f236165256

    • SHA1

      8ae7f79d06378c6ae313905ac81454088a9b7b8f

    • SHA256

      a3f36a4527abd8e1bd4dcf0185d76c5b6715cbf7d02ea17c72decf5c4e42e74d

    • SHA512

      b9bffc385abc999e5d3f1d3d643d4771113deb98b685f92885960a524cf5b652298274038ff441ccec7b29f536ccb17c2da051c54d8c6db569ae0b62c95d1cfe

    • SSDEEP

      6144:tljew4Hr0L0tSldQqzCXkg5dbI+YyUjI7ODNol012jW71w8:CprbtQdNC0EbPYyUj9OqZ7j

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks