General

  • Target

    KaanAbiPlzDene.exe

  • Size

    658KB

  • Sample

    241006-shjg2avbrc

  • MD5

    90d939df124d1c82d76426280b1fa2c9

  • SHA1

    47f728df8000c0900e6d690f2dec80a6ac05acd6

  • SHA256

    48cdd4b24a56ca0e6ff30aa00eb3d6532484357e931a8f5899fb60471e43eaa5

  • SHA512

    4c4497b206ddedfe9cd80bb0fddf91a7f792843a2f24e4bdd3fb9a6f11485d1d4ab5abc3120216306b75a232e051fdeb30c796d9d6ee26c87eef1344e368f451

  • SSDEEP

    12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hA:KZ1xuVVjfFoynPaVBUR8f+kN10EBC

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

onsj8tw.localto.net:4441

Mutex

DC_MUTEX-TE42XFY

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    bK7rR71v3MxK

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      KaanAbiPlzDene.exe

    • Size

      658KB

    • MD5

      90d939df124d1c82d76426280b1fa2c9

    • SHA1

      47f728df8000c0900e6d690f2dec80a6ac05acd6

    • SHA256

      48cdd4b24a56ca0e6ff30aa00eb3d6532484357e931a8f5899fb60471e43eaa5

    • SHA512

      4c4497b206ddedfe9cd80bb0fddf91a7f792843a2f24e4bdd3fb9a6f11485d1d4ab5abc3120216306b75a232e051fdeb30c796d9d6ee26c87eef1344e368f451

    • SSDEEP

      12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hA:KZ1xuVVjfFoynPaVBUR8f+kN10EBC

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks