General

  • Target

    49c0b1d294cca6b6c0d78b16f2b0efb081cd49bfe586653ea533b07328761aa6

  • Size

    649KB

  • Sample

    241215-1v4bzazrem

  • MD5

    2228a7c38b50114e7bec2d943f06acde

  • SHA1

    15c6b33fe6a0ca328c2036b9017cd6d3a4a4397e

  • SHA256

    49c0b1d294cca6b6c0d78b16f2b0efb081cd49bfe586653ea533b07328761aa6

  • SHA512

    8c19ec40e2599613f7a8e4ba4544a1080f49db1740939c4fce4fcb8a0e9e111c4548a5aab6a0246b335858b6bf258ed7f2faa84c8d3d157e093fd5803ba5f488

  • SSDEEP

    12288:bk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+X:Q0QRWoJEfg0oChGdJQbjPbNW5tYeP+Ge

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

BAHROZPOOL.ZAPTO.ORG:1604

Mutex

DCMIN_MUTEX-FQK5TTL

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    brdwfMVFo8ev

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      49c0b1d294cca6b6c0d78b16f2b0efb081cd49bfe586653ea533b07328761aa6

    • Size

      649KB

    • MD5

      2228a7c38b50114e7bec2d943f06acde

    • SHA1

      15c6b33fe6a0ca328c2036b9017cd6d3a4a4397e

    • SHA256

      49c0b1d294cca6b6c0d78b16f2b0efb081cd49bfe586653ea533b07328761aa6

    • SHA512

      8c19ec40e2599613f7a8e4ba4544a1080f49db1740939c4fce4fcb8a0e9e111c4548a5aab6a0246b335858b6bf258ed7f2faa84c8d3d157e093fd5803ba5f488

    • SSDEEP

      12288:bk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+X:Q0QRWoJEfg0oChGdJQbjPbNW5tYeP+Ge

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks