General

  • Target

    706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277dN.exe

  • Size

    304KB

  • Sample

    241128-n7rsgssnfl

  • MD5

    342bda490672d77622a6917ccecdab20

  • SHA1

    3bb653874418bb2a3666f2ca39710d97b1bfa871

  • SHA256

    706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277d

  • SHA512

    a5d0ab425b723165072ebcfbd65cd05e464a83774dd24a30a10a10654d068006bd06dfc92f1b88010ebd05c4f629a43b18b5331669a1ee9fc8d5f66572dfbe7b

  • SSDEEP

    6144:X2T/3If9vSuNT6woPu7pWil15P0Wrep5h05X/CpNWpyJoNCzh:XQ3ICaEil16Cs5u1974V

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

2.235.168.213:81

Mutex

DCMIN_MUTEX-JSD8YH2

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    7fsLUSe9cMso

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    210978

Targets

    • Target

      706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277dN.exe

    • Size

      304KB

    • MD5

      342bda490672d77622a6917ccecdab20

    • SHA1

      3bb653874418bb2a3666f2ca39710d97b1bfa871

    • SHA256

      706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277d

    • SHA512

      a5d0ab425b723165072ebcfbd65cd05e464a83774dd24a30a10a10654d068006bd06dfc92f1b88010ebd05c4f629a43b18b5331669a1ee9fc8d5f66572dfbe7b

    • SSDEEP

      6144:X2T/3If9vSuNT6woPu7pWil15P0Wrep5h05X/CpNWpyJoNCzh:XQ3ICaEil16Cs5u1974V

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks