General

  • Target

    SolaraBootstrapperBETA.exe

  • Size

    1.4MB

  • Sample

    240621-nmd1wsxgnd

  • MD5

    aac6f9a136a163845635ef37e94a1a1f

  • SHA1

    82e7c9a969f68a531d9eddf13b4166397d9b1046

  • SHA256

    d9785b4c1600b00c8271ba870183b904c9ea5cd3f60b633222794a510e25396b

  • SHA512

    701173201c97965f0bfeb024f90e438c3392cc83aac5913faf499cc86b97588bc8c480743082683d0a3c3d76fa0595800483e17599f8c7317084fafbb9d9f4d5

  • SSDEEP

    24576:OnAw2WWeFcfbP9VPSPMTSPL/rWvzq4JJfpUkmzgH385QojA1j855xSHIn:EELbVMTrOq41BojA1ji5xN

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

carolina-reverse.gl.at.ply.gg:34609

Mutex

DC_MUTEX-8C83C8U

Attributes
  • InstallPath

    Dllhost\msdcsc.exe

  • gencode

    sZoWk3fRAZM0

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    Solara

Targets

    • Target

      SolaraBootstrapperBETA.exe

    • Size

      1.4MB

    • MD5

      aac6f9a136a163845635ef37e94a1a1f

    • SHA1

      82e7c9a969f68a531d9eddf13b4166397d9b1046

    • SHA256

      d9785b4c1600b00c8271ba870183b904c9ea5cd3f60b633222794a510e25396b

    • SHA512

      701173201c97965f0bfeb024f90e438c3392cc83aac5913faf499cc86b97588bc8c480743082683d0a3c3d76fa0595800483e17599f8c7317084fafbb9d9f4d5

    • SSDEEP

      24576:OnAw2WWeFcfbP9VPSPMTSPL/rWvzq4JJfpUkmzgH385QojA1j855xSHIn:EELbVMTrOq41BojA1ji5xN

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks