General

  • Target

    f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe

  • Size

    5.3MB

  • Sample

    241204-ymdegayjhy

  • MD5

    37bc24bd5ce2067bdb0c34c0ca414c00

  • SHA1

    3d7b67e7370d79533cb984330f21e5f5c5b9479a

  • SHA256

    f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185d

  • SHA512

    bf4fe4f5139bd206792b645509aaf42be2d58d3f003a497c799bbd3d860ec5c9193f781e4d1525ddd9f7798f8395d21e96ed74ceeb52c0ab43df3d642758ad8a

  • SSDEEP

    98304:aOQGc830HeOIk0ons6U523lPWZIERFog7icldle+HJFD:hrj30qkXnsr2YIIog7if+HJF

Malware Config

Extracted

Family

darkcomet

Botnet

GoogleDebugger

C2

147.185.221.24:14161

Mutex

RO_MUTEX-8HU43EZ

Attributes
  • InstallPath

    ChromeCookies\ChromeCookie.exe

  • gencode

    WN0BLB8aPxBw

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    GoogleDebugJ

Targets

    • Target

      f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe

    • Size

      5.3MB

    • MD5

      37bc24bd5ce2067bdb0c34c0ca414c00

    • SHA1

      3d7b67e7370d79533cb984330f21e5f5c5b9479a

    • SHA256

      f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185d

    • SHA512

      bf4fe4f5139bd206792b645509aaf42be2d58d3f003a497c799bbd3d860ec5c9193f781e4d1525ddd9f7798f8395d21e96ed74ceeb52c0ab43df3d642758ad8a

    • SSDEEP

      98304:aOQGc830HeOIk0ons6U523lPWZIERFog7icldle+HJFD:hrj30qkXnsr2YIIog7if+HJF

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks