General

  • Target

    eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816

  • Size

    350KB

  • Sample

    241005-zr9txaxdkh

  • MD5

    220fd88ed61a81dd7238c8385fc8c5f7

  • SHA1

    b4c6ea98e705912f38816bd4aff085871b1bae80

  • SHA256

    eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816

  • SHA512

    355aad3cc89c3d6acaf53a7091903d6b0b4092e1f4c7bc6c41255a7aafce00d3807ddad4b5c027a0437938e17278f7a8d591a085b4e014fff8d6165fdeb6838f

  • SSDEEP

    6144:hSncRldcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37wxM:Q4jcW7KEZlPzCy37

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

sussynv83dj893.duckdns.org:1604

Mutex

DC_MUTEX-RU83HNV

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    MFz6heXQQ4jP

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816

    • Size

      350KB

    • MD5

      220fd88ed61a81dd7238c8385fc8c5f7

    • SHA1

      b4c6ea98e705912f38816bd4aff085871b1bae80

    • SHA256

      eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816

    • SHA512

      355aad3cc89c3d6acaf53a7091903d6b0b4092e1f4c7bc6c41255a7aafce00d3807ddad4b5c027a0437938e17278f7a8d591a085b4e014fff8d6165fdeb6838f

    • SSDEEP

      6144:hSncRldcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37wxM:Q4jcW7KEZlPzCy37

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks