General

  • Target

    6a8f1e064f0b2da3fa45022c5ed1408256c8f12c9631442eb5930277916485f5.exe

  • Size

    283KB

  • Sample

    250108-yr75mstmdm

  • MD5

    bff9a9f371171e16afab59da8dfdc680

  • SHA1

    4c5c35c997754b5d99907b4c4c1c45d08b37cc0f

  • SHA256

    6a8f1e064f0b2da3fa45022c5ed1408256c8f12c9631442eb5930277916485f5

  • SHA512

    e979fb4525aca5d8314bbc2c9e6241859771ac425606921260d2cd8d6e9aacb6c5d9a8105c3b260d9d4a7f7c88936077dd6375f69d5050331d679a3031b1ee64

  • SSDEEP

    6144:ycNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37hjWX:ycW7KEZlPzCy37hjWX

Malware Config

Extracted

Family

darkcomet

Botnet

tio

C2

2.82.41.139:80

Mutex

DC_MUTEX-277EST2

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    EnEvlyl9AxvG

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

Targets

    • Target

      6a8f1e064f0b2da3fa45022c5ed1408256c8f12c9631442eb5930277916485f5.exe

    • Size

      283KB

    • MD5

      bff9a9f371171e16afab59da8dfdc680

    • SHA1

      4c5c35c997754b5d99907b4c4c1c45d08b37cc0f

    • SHA256

      6a8f1e064f0b2da3fa45022c5ed1408256c8f12c9631442eb5930277916485f5

    • SHA512

      e979fb4525aca5d8314bbc2c9e6241859771ac425606921260d2cd8d6e9aacb6c5d9a8105c3b260d9d4a7f7c88936077dd6375f69d5050331d679a3031b1ee64

    • SSDEEP

      6144:ycNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37hjWX:ycW7KEZlPzCy37hjWX

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks