General

  • Target

    042c69df5287de3ffcb3f44c8be03e60_NeikiAnalytics.exe

  • Size

    660KB

  • Sample

    240526-1e2hfacg4x

  • MD5

    042c69df5287de3ffcb3f44c8be03e60

  • SHA1

    d63e86de43106b4e6514e0c0f12cef2336b1b115

  • SHA256

    fc18e9c1144c6944e7a2204b9eade93950512c8541e51a7d1d4efadbad2e7108

  • SHA512

    7fc61a829f32200c2bec8323bfd0f905cff32bfb845e5a75cce686784b07b78f46e0b7b0940b9840a2a5989e8dd197f62a9af17dc4c9908332296cc4c6788c06

  • SSDEEP

    12288:1XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkwh/W:JnAw2WWeFcfbP9VPSPMTSPL/rWvzq4Js

Malware Config

Extracted

Family

darkcomet

Botnet

test1

C2

izidor.no-ip.biz:82

Mutex

DC_MUTEX-V827SY6

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    7kL8vmlHPZ8o

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      042c69df5287de3ffcb3f44c8be03e60_NeikiAnalytics.exe

    • Size

      660KB

    • MD5

      042c69df5287de3ffcb3f44c8be03e60

    • SHA1

      d63e86de43106b4e6514e0c0f12cef2336b1b115

    • SHA256

      fc18e9c1144c6944e7a2204b9eade93950512c8541e51a7d1d4efadbad2e7108

    • SHA512

      7fc61a829f32200c2bec8323bfd0f905cff32bfb845e5a75cce686784b07b78f46e0b7b0940b9840a2a5989e8dd197f62a9af17dc4c9908332296cc4c6788c06

    • SSDEEP

      12288:1XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkwh/W:JnAw2WWeFcfbP9VPSPMTSPL/rWvzq4Js

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

3
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks