Resubmissions

15-12-2024 23:12

241215-266f5stlek 10

15-12-2024 23:08

241215-24z7ca1qcs 10

General

  • Target

    627665c1194f64deddc23172808affe3be158d789fadd21a578aacf365e95c00N.exe

  • Size

    923KB

  • Sample

    241215-24z7ca1qcs

  • MD5

    eae8a05fffd6b4114e5d70c1b4535020

  • SHA1

    39bb907ee415df3bd1a880c5ffeddb739b059d79

  • SHA256

    627665c1194f64deddc23172808affe3be158d789fadd21a578aacf365e95c00

  • SHA512

    a0a8a557e0c44d53deefeb83d5b3d0e7834e3b2219ec06de11062dced32e29cf4fc2e24c97689e1b8e823ed85dfae054157d496e219835a87de88ba395cc9b6d

  • SSDEEP

    24576:Ro2zJs0c7HR29rZXig2kNIKAmvC+Cq5j:Hco9ggFN7L

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

quenlol.no-ip.biz:127

Mutex

DCMIN_MUTEX-PRAANXA

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    JFuSyZ60x02G

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      627665c1194f64deddc23172808affe3be158d789fadd21a578aacf365e95c00N.exe

    • Size

      923KB

    • MD5

      eae8a05fffd6b4114e5d70c1b4535020

    • SHA1

      39bb907ee415df3bd1a880c5ffeddb739b059d79

    • SHA256

      627665c1194f64deddc23172808affe3be158d789fadd21a578aacf365e95c00

    • SHA512

      a0a8a557e0c44d53deefeb83d5b3d0e7834e3b2219ec06de11062dced32e29cf4fc2e24c97689e1b8e823ed85dfae054157d496e219835a87de88ba395cc9b6d

    • SSDEEP

      24576:Ro2zJs0c7HR29rZXig2kNIKAmvC+Cq5j:Hco9ggFN7L

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks