General

  • Target

    123.exe

  • Size

    658KB

  • Sample

    240708-pg8hzs1cpf

  • MD5

    0c2122de1d9ef04a16f8c7fde165b05c

  • SHA1

    c4750e5479b8feb98d60138602c389f563ac272b

  • SHA256

    800188a364c733428082e945b052c227aff3d453006b4774bf2e3c1f137998ba

  • SHA512

    4a0ad47fd80c4d890d8ca0ffc1c4817425f849ad890476b5ab2b22f6239efb16c654757a1c4953861dc830543110d851b1464089f4cfbf03238aade5d4943770

  • SSDEEP

    12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h0:+Z1xuVVjfFoynPaVBUR8f+kN10EBC

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

politics-installing.gl.at.ply.gg:59813

Mutex

DCMIN_MUTEX-TK9YCV2

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    YVGhoVbaz4u7

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      123.exe

    • Size

      658KB

    • MD5

      0c2122de1d9ef04a16f8c7fde165b05c

    • SHA1

      c4750e5479b8feb98d60138602c389f563ac272b

    • SHA256

      800188a364c733428082e945b052c227aff3d453006b4774bf2e3c1f137998ba

    • SHA512

      4a0ad47fd80c4d890d8ca0ffc1c4817425f849ad890476b5ab2b22f6239efb16c654757a1c4953861dc830543110d851b1464089f4cfbf03238aade5d4943770

    • SSDEEP

      12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h0:+Z1xuVVjfFoynPaVBUR8f+kN10EBC

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks