General

  • Target

    4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381.exe

  • Size

    282KB

  • Sample

    250216-vkrmjatmcz

  • MD5

    38a67b2fa87a6d49c5fed725ef7cc3e6

  • SHA1

    49b608056a135553bb06046e5bd03d118661648a

  • SHA256

    4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381

  • SHA512

    9daac628212a599ab53e711b2bebc53d32c72cf6d21e5fc106e3898fdc4ed3693fca4dee0dac1b1352ccb359fafde2d76f4590f250ef65821ea4ab60b2687da6

  • SSDEEP

    6144:Q7DuIRToyeNNkwLq/oCjEqfZgDQJa342ERAiU8AIHHA+K:kTo1ZqfjEGZiMRAiU+HAT

Malware Config

Extracted

Family

darkcomet

Botnet

RS

C2

hoszelaar.no-ip.org:10101

Mutex

DC_MUTEX-X4K5D3S

Attributes
  • gencode

    NKcVDHlXwyol

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Targets

    • Target

      4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381.exe

    • Size

      282KB

    • MD5

      38a67b2fa87a6d49c5fed725ef7cc3e6

    • SHA1

      49b608056a135553bb06046e5bd03d118661648a

    • SHA256

      4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381

    • SHA512

      9daac628212a599ab53e711b2bebc53d32c72cf6d21e5fc106e3898fdc4ed3693fca4dee0dac1b1352ccb359fafde2d76f4590f250ef65821ea4ab60b2687da6

    • SSDEEP

      6144:Q7DuIRToyeNNkwLq/oCjEqfZgDQJa342ERAiU8AIHHA+K:kTo1ZqfjEGZiMRAiU+HAT

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Downloads MZ/PE file

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks