General

  • Target

    729ed839a7e876e8729b40e94da4193a9a1600387771f89adff0fdf23959e5ebN.exe

  • Size

    2.0MB

  • Sample

    241207-2zsxgatpcp

  • MD5

    dd03ae443c895e8ce439b1470c3bc050

  • SHA1

    559163d693bb56d225d9dbd96a8abe8adad25193

  • SHA256

    729ed839a7e876e8729b40e94da4193a9a1600387771f89adff0fdf23959e5eb

  • SHA512

    f7548c524118ede20be11c294359d1919675a3dac04757d21ef7590b1ebe9d85c8161bb130b0ff168be4e64f1118fe7375f840d0c01d22908f0760e28942da47

  • SSDEEP

    49152:9USaVTmnMWlSMichIn/Ex3Z13vD1YYYYYYYYYYYYYYYBO:9USaVinXkca/Exp1fDr

Malware Config

Extracted

Family

darkcomet

Botnet

Guest17

C2

targetyou.no-ip.org:57847

Mutex

DC_MUTEX-8RJ9SX1

Attributes
  • gencode

    KFM4M3Ap5ZPh

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

Targets

    • Target

      729ed839a7e876e8729b40e94da4193a9a1600387771f89adff0fdf23959e5ebN.exe

    • Size

      2.0MB

    • MD5

      dd03ae443c895e8ce439b1470c3bc050

    • SHA1

      559163d693bb56d225d9dbd96a8abe8adad25193

    • SHA256

      729ed839a7e876e8729b40e94da4193a9a1600387771f89adff0fdf23959e5eb

    • SHA512

      f7548c524118ede20be11c294359d1919675a3dac04757d21ef7590b1ebe9d85c8161bb130b0ff168be4e64f1118fe7375f840d0c01d22908f0760e28942da47

    • SSDEEP

      49152:9USaVTmnMWlSMichIn/Ex3Z13vD1YYYYYYYYYYYYYYYBO:9USaVinXkca/Exp1fDr

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies security service

    • Windows security bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks