General

  • Target

    a253a91771977d2b4801802c7b2987e49c292f5821d9bb737f6aa83f82cd7c1cN.exe

  • Size

    946KB

  • Sample

    241202-g8eqzstlbs

  • MD5

    d6c3469a3073e8d93cf8b4de3220afd0

  • SHA1

    dd47cbc9736d709d5ce7515f5a1f0f16a1210dd5

  • SHA256

    a253a91771977d2b4801802c7b2987e49c292f5821d9bb737f6aa83f82cd7c1c

  • SHA512

    e5e62e59030645b580841e2796c94e56c14ee9c36ae765c5d832907135050a1db2554323ced400a7590c2bf141d27ca1b03e9356567e440984b62807aaf4bb46

  • SSDEEP

    12288:TJ2AsSLPMimCfwKxjctgIiFoaY+Ez7alWQQuvVTpP9gX5yGQ:TwAs0MTMx84EzWWVIJT5

Malware Config

Extracted

Family

darkcomet

Botnet

Crypt

C2

dcserv1603.zapto.org:999

192.168.1.4:999

Mutex

DC_MUTEX-CYSHT90

Attributes
  • gencode

    BxRLSy9sb7uW

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      a253a91771977d2b4801802c7b2987e49c292f5821d9bb737f6aa83f82cd7c1cN.exe

    • Size

      946KB

    • MD5

      d6c3469a3073e8d93cf8b4de3220afd0

    • SHA1

      dd47cbc9736d709d5ce7515f5a1f0f16a1210dd5

    • SHA256

      a253a91771977d2b4801802c7b2987e49c292f5821d9bb737f6aa83f82cd7c1c

    • SHA512

      e5e62e59030645b580841e2796c94e56c14ee9c36ae765c5d832907135050a1db2554323ced400a7590c2bf141d27ca1b03e9356567e440984b62807aaf4bb46

    • SSDEEP

      12288:TJ2AsSLPMimCfwKxjctgIiFoaY+Ez7alWQQuvVTpP9gX5yGQ:TwAs0MTMx84EzWWVIJT5

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks