General

  • Target

    34699231be16c5d6a5e12d69fa97ae4c2e8c243894d6f22feb6d8c0686a99f0bN

  • Size

    993KB

  • Sample

    241020-aw7snszhkm

  • MD5

    4424ff327fc46ccbf1e122212df6f6c0

  • SHA1

    b1d555f699b5c1f04cf05b5a09f7c03195275b71

  • SHA256

    34699231be16c5d6a5e12d69fa97ae4c2e8c243894d6f22feb6d8c0686a99f0b

  • SHA512

    91c752aa8d6e5f27f783f16c518ea41c3d3cd1d11eb610447a4b268ffa280489c51ca70ed46b4797aa5d8f8d581e98f6e97c45a62b4ac25fe9b5b7429846d9cf

  • SSDEEP

    24576:2AojG2m6TtySYXU9/UwlPGhnxy4i9XCWsu5agFya3T5OeZINOh:A/PtySL9/UwluhnhuyWZagdTcuIQh

Malware Config

Extracted

Family

darkcomet

Botnet

Dyn-NoIp

C2

rezausa.no-ip.org:3030

rezausa.dyndns.org:3030

Mutex

DC_MUTEX-S2T3FWA

Attributes
  • InstallPath

    taskhost.exe

  • gencode

    MR9sLp0UQRG4

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      34699231be16c5d6a5e12d69fa97ae4c2e8c243894d6f22feb6d8c0686a99f0bN

    • Size

      993KB

    • MD5

      4424ff327fc46ccbf1e122212df6f6c0

    • SHA1

      b1d555f699b5c1f04cf05b5a09f7c03195275b71

    • SHA256

      34699231be16c5d6a5e12d69fa97ae4c2e8c243894d6f22feb6d8c0686a99f0b

    • SHA512

      91c752aa8d6e5f27f783f16c518ea41c3d3cd1d11eb610447a4b268ffa280489c51ca70ed46b4797aa5d8f8d581e98f6e97c45a62b4ac25fe9b5b7429846d9cf

    • SSDEEP

      24576:2AojG2m6TtySYXU9/UwlPGhnxy4i9XCWsu5agFya3T5OeZINOh:A/PtySL9/UwluhnhuyWZagdTcuIQh

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks