General

  • Target

    10174037f6bab4969360f655ef10a911e535d19b2c731fbe95623b1855050903.exe

  • Size

    966KB

  • Sample

    241219-lc6xtayldt

  • MD5

    22977eaececc124b167967723f591e76

  • SHA1

    b209dc0f7a983c03a80885607b826f3e6879b4bc

  • SHA256

    10174037f6bab4969360f655ef10a911e535d19b2c731fbe95623b1855050903

  • SHA512

    ffd739b82dee5791cf4a932d1d8f7a67d14ec851cc49a433cf404cbc885b785eba67848131365ce38cddd5940dd1174b18ec21572301fcc074f2faed599a40f7

  • SSDEEP

    12288:N3TD4DnRfwKl+znaNpofSsa9Pi+W9iXqpea3wJWIfBT3PGUE0/DrRrPGVJ:FTQuKl+zsUC6J9i+3wJRT3PI0/xGj

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

74.65.183.83:1604

74.65.183.83:25565

74.65.183.83:1122

74.65.183.83:100

Mutex

DC_MUTEX-XH87550

Attributes
  • InstallPath

    WindowsUpdate.exe

  • gencode

    MwBxQSYoXbQb

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    WindoesUpdate.dll

Targets

    • Target

      10174037f6bab4969360f655ef10a911e535d19b2c731fbe95623b1855050903.exe

    • Size

      966KB

    • MD5

      22977eaececc124b167967723f591e76

    • SHA1

      b209dc0f7a983c03a80885607b826f3e6879b4bc

    • SHA256

      10174037f6bab4969360f655ef10a911e535d19b2c731fbe95623b1855050903

    • SHA512

      ffd739b82dee5791cf4a932d1d8f7a67d14ec851cc49a433cf404cbc885b785eba67848131365ce38cddd5940dd1174b18ec21572301fcc074f2faed599a40f7

    • SSDEEP

      12288:N3TD4DnRfwKl+znaNpofSsa9Pi+W9iXqpea3wJWIfBT3PGUE0/DrRrPGVJ:FTQuKl+zsUC6J9i+3wJRT3PI0/xGj

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks