General
-
Target
New folder.zip
-
Size
1.2MB
-
Sample
240708-lmn5ravgrc
-
MD5
622d5994b151cf2d039d32b5cdd83227
-
SHA1
312e0a45ffdbcf32e26f2699d3d3f7fdefbc020f
-
SHA256
8d7e0046922716f97deef518f2d9f05e7a7dc8c3b6065b8d01ed1844c05d1999
-
SHA512
5659576c8303688e320fbe4e3e4c5813a3cae7421fa6ffadc02743c22f24f0ad9c5aae65366fa5e980fa8cc099038054a4d391381deac4b41123cd9db36fe43a
-
SSDEEP
24576:KR5iks6CqE+i952S3R9JIIy6JknCd6n7MZlTfc+kVKbxTKQDFC:7D6JE552S3lJk86n7ATfc9VKbvC
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:8808
QdNftpHJFSw4
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
darkcomet
test
127.0.0.1:1604
DCMIN_MUTEX-HWSPW2B
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
GwLxsmlWyDzE
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
New folder.zip
-
Size
1.2MB
-
MD5
622d5994b151cf2d039d32b5cdd83227
-
SHA1
312e0a45ffdbcf32e26f2699d3d3f7fdefbc020f
-
SHA256
8d7e0046922716f97deef518f2d9f05e7a7dc8c3b6065b8d01ed1844c05d1999
-
SHA512
5659576c8303688e320fbe4e3e4c5813a3cae7421fa6ffadc02743c22f24f0ad9c5aae65366fa5e980fa8cc099038054a4d391381deac4b41123cd9db36fe43a
-
SSDEEP
24576:KR5iks6CqE+i952S3R9JIIy6JknCd6n7MZlTfc+kVKbxTKQDFC:7D6JE552S3lJk86n7ATfc9VKbvC
-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1