General

  • Target

    dc27c0a88d38ac8b30573a8868c920bf2d537fe381950a85716d15e4343254dd.exe

  • Size

    659KB

  • Sample

    250107-qz5eqavqgn

  • MD5

    8f8f755df17f3dd61a628934b055b4b9

  • SHA1

    7841cb19673e4d23fda1eda402c0f6ca6b369dad

  • SHA256

    dc27c0a88d38ac8b30573a8868c920bf2d537fe381950a85716d15e4343254dd

  • SHA512

    2f36f64c61f975c6007962f08e21eb7fef8c3030f357d86cfe3d86ca456b1b02265895cb28ca631eee3882170345bbe224d044ac63af7ae931f3d7dcd0c29771

  • SSDEEP

    12288:O9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hu:aZ1xuVVjfFoynPaVBUR8f+kN10EBU

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

46.105.250.97:1604

Mutex

DC_MUTEX-3TMAVLG

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    l152Z1g7L1AT

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      dc27c0a88d38ac8b30573a8868c920bf2d537fe381950a85716d15e4343254dd.exe

    • Size

      659KB

    • MD5

      8f8f755df17f3dd61a628934b055b4b9

    • SHA1

      7841cb19673e4d23fda1eda402c0f6ca6b369dad

    • SHA256

      dc27c0a88d38ac8b30573a8868c920bf2d537fe381950a85716d15e4343254dd

    • SHA512

      2f36f64c61f975c6007962f08e21eb7fef8c3030f357d86cfe3d86ca456b1b02265895cb28ca631eee3882170345bbe224d044ac63af7ae931f3d7dcd0c29771

    • SSDEEP

      12288:O9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hu:aZ1xuVVjfFoynPaVBUR8f+kN10EBU

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks