General

  • Target

    db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe

  • Size

    818KB

  • Sample

    250107-ewwgvswken

  • MD5

    3f29936a5969953a1ac7b2575c75ce42

  • SHA1

    1012715db3f50f9920e6b087e1c51510240ee4f2

  • SHA256

    db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c

  • SHA512

    d8020f369d48f10662170c90d0224b12e3500b447e5725e628f0e5e2b4cb480e82c2a281a5b29cde87bf13649f74d1f4d49acd908c7be1078df7bbe7ead8d990

  • SSDEEP

    24576:BK4U9Ot+ogFV7gxzq6SOEo9no4DtLIBbl+z2kTh:o4Uw+LF9gJL+om61jh

Malware Config

Extracted

Family

darkcomet

Botnet

Slave

C2

ghost1997.no-ip.biz:1337

Mutex

DC_MUTEX-AZZ26SG

Attributes
  • gencode

    v1pe6tD2bNTU

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe

    • Size

      818KB

    • MD5

      3f29936a5969953a1ac7b2575c75ce42

    • SHA1

      1012715db3f50f9920e6b087e1c51510240ee4f2

    • SHA256

      db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c

    • SHA512

      d8020f369d48f10662170c90d0224b12e3500b447e5725e628f0e5e2b4cb480e82c2a281a5b29cde87bf13649f74d1f4d49acd908c7be1078df7bbe7ead8d990

    • SSDEEP

      24576:BK4U9Ot+ogFV7gxzq6SOEo9no4DtLIBbl+z2kTh:o4Uw+LF9gJL+om61jh

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Windows security bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks