General

  • Target

    ecde9dcd0af7dfaf2f9c9cd6e64bacfed2f7f205b939e6fe6266ecac3212f5e4N.exe

  • Size

    658KB

  • Sample

    241204-wr81tstrbt

  • MD5

    d31a4bdd7b7c68f1f64e0f04e5d364f0

  • SHA1

    40d702ff3cebd2a3bdab06fc907be09d34261b15

  • SHA256

    ecde9dcd0af7dfaf2f9c9cd6e64bacfed2f7f205b939e6fe6266ecac3212f5e4

  • SHA512

    77279820d73c29c8ba387630487e4c9f09856c9ded4ff61368d437b68a76b4dc5a801f3dea1b46042b11480d2619d8f4356e3db30ae71184def2d2ecb855b7bc

  • SSDEEP

    12288:e9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hx:qZ1xuVVjfFoynPaVBUR8f+kN10EBv

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

anonymousreal.no-ip.biz:200

Mutex

DC_MUTEX-S8ETPZZ

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    kVvg3ArjwPxT

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    rundll32

Targets

    • Target

      ecde9dcd0af7dfaf2f9c9cd6e64bacfed2f7f205b939e6fe6266ecac3212f5e4N.exe

    • Size

      658KB

    • MD5

      d31a4bdd7b7c68f1f64e0f04e5d364f0

    • SHA1

      40d702ff3cebd2a3bdab06fc907be09d34261b15

    • SHA256

      ecde9dcd0af7dfaf2f9c9cd6e64bacfed2f7f205b939e6fe6266ecac3212f5e4

    • SHA512

      77279820d73c29c8ba387630487e4c9f09856c9ded4ff61368d437b68a76b4dc5a801f3dea1b46042b11480d2619d8f4356e3db30ae71184def2d2ecb855b7bc

    • SSDEEP

      12288:e9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hx:qZ1xuVVjfFoynPaVBUR8f+kN10EBv

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks