General

  • Target

    bebe.exe

  • Size

    673KB

  • Sample

    241214-y16ceavlck

  • MD5

    c54bab8eb46885b47508cfbfde84d078

  • SHA1

    120c346c4e73ebced892acecb4221614ebb8dd33

  • SHA256

    f19cedc8f5dd2c0a5d788a55f2232c8e26b32067fe113762688d83aff4ce99f6

  • SHA512

    ef2bfffca1582fc968620af5356339f3a053c58f9f677efcbb902aa3e4b50eb05c693326ac70e619451a3e819b82f5d42f684e374937b26f81db770ceaaa2a1e

  • SSDEEP

    12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hOvk:+Z1xuVVjfFoynPaVBUR8f+kN10EB8vk

Malware Config

Extracted

Family

darkcomet

Botnet

Ýndiren

C2

127.0.0.1:1604

Mutex

DC_MUTEX-V1NDW18

Attributes
  • InstallPath

    Windows gezgini\explorer.exe

  • gencode

    0uLqlTjXDDg2

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    System

Targets

    • Target

      bebe.exe

    • Size

      673KB

    • MD5

      c54bab8eb46885b47508cfbfde84d078

    • SHA1

      120c346c4e73ebced892acecb4221614ebb8dd33

    • SHA256

      f19cedc8f5dd2c0a5d788a55f2232c8e26b32067fe113762688d83aff4ce99f6

    • SHA512

      ef2bfffca1582fc968620af5356339f3a053c58f9f677efcbb902aa3e4b50eb05c693326ac70e619451a3e819b82f5d42f684e374937b26f81db770ceaaa2a1e

    • SSDEEP

      12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hOvk:+Z1xuVVjfFoynPaVBUR8f+kN10EB8vk

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks