General

  • Target

    a75641edd3e29777eb3c2dbfd02d8f12411a9a9fd38dc44cc984f5cee162762aN.exe

  • Size

    805KB

  • Sample

    241208-a7wjsatjft

  • MD5

    7b1b1cc0e6eefdf5ca5819b5a51336a0

  • SHA1

    85cbb6deb81787e202d65543e3e6fd10805efa60

  • SHA256

    a75641edd3e29777eb3c2dbfd02d8f12411a9a9fd38dc44cc984f5cee162762a

  • SHA512

    e9a9ffd88ddeec0432c7270951c3c2f21427611181ac951bdbc546fd77edd0e416d5ea88acc62fef40ab1440a3f620864526b53348eff635a8170d4c23c71f51

  • SSDEEP

    12288:x9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hLl:rZ1xuVVjfFoynPaVBUR8f+kN10EBL

Malware Config

Extracted

Family

darkcomet

Botnet

Deneme

C2

94.54.216.104:81

Mutex

DC_MUTEX-R63XF5V

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    zVBuCkW9HfLL

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      a75641edd3e29777eb3c2dbfd02d8f12411a9a9fd38dc44cc984f5cee162762aN.exe

    • Size

      805KB

    • MD5

      7b1b1cc0e6eefdf5ca5819b5a51336a0

    • SHA1

      85cbb6deb81787e202d65543e3e6fd10805efa60

    • SHA256

      a75641edd3e29777eb3c2dbfd02d8f12411a9a9fd38dc44cc984f5cee162762a

    • SHA512

      e9a9ffd88ddeec0432c7270951c3c2f21427611181ac951bdbc546fd77edd0e416d5ea88acc62fef40ab1440a3f620864526b53348eff635a8170d4c23c71f51

    • SSDEEP

      12288:x9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hLl:rZ1xuVVjfFoynPaVBUR8f+kN10EBL

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks