General

  • Target

    3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafdeN

  • Size

    929KB

  • Sample

    241109-ev1eesxejh

  • MD5

    92ff8539eb093582609a7a8083f38930

  • SHA1

    fde8cc65fdd5ab825f1be7daa9c9e422d32a3c7f

  • SHA256

    3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafde

  • SHA512

    bd3303b7b73b0e2460db1cbd2428b3e55ed56d8c6258d016613c762190a3196ecfade2c98ba59a23e207a67c9efa67b3e0da880bc299020eb4130a6092a024fd

  • SSDEEP

    24576:I+QawCFbpfu2X0UOkcBk8NPktcNrUBC0lyE:YjupvOzpZSrX

Malware Config

Extracted

Family

darkcomet

Botnet

TP

C2

eviloton.no-ip.biz:1604

Mutex

DCMIN_MUTEX-QZP3U75

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    hrLBKzjjkYGB

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafdeN

    • Size

      929KB

    • MD5

      92ff8539eb093582609a7a8083f38930

    • SHA1

      fde8cc65fdd5ab825f1be7daa9c9e422d32a3c7f

    • SHA256

      3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafde

    • SHA512

      bd3303b7b73b0e2460db1cbd2428b3e55ed56d8c6258d016613c762190a3196ecfade2c98ba59a23e207a67c9efa67b3e0da880bc299020eb4130a6092a024fd

    • SSDEEP

      24576:I+QawCFbpfu2X0UOkcBk8NPktcNrUBC0lyE:YjupvOzpZSrX

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks