General

  • Target

    9c5d33e58b7ef0eeb97ed7fe1f74f300949e9cab6e2354b0ad1cd3dc756bfcb9

  • Size

    349KB

  • Sample

    250221-e5r6sstkfm

  • MD5

    ebef4f6c9ac0f0745df09a213224741d

  • SHA1

    25e2d51e8be6e517822833fcb435cb772dfa49a9

  • SHA256

    9c5d33e58b7ef0eeb97ed7fe1f74f300949e9cab6e2354b0ad1cd3dc756bfcb9

  • SHA512

    ecc5a3cd54b3a92f359e1628739f361a1f26c03c19b6c454482c93a1e33c583454725bbda7b5cc98ee9d8b72ae8c1bf9e6b75b1f4ca0b248d4cf1f0cdd8cf3f8

  • SSDEEP

    6144:QcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37aplvccV:QcW7KEZlPzCy372UcV

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

5.178.3.137:1604

Mutex

DC_MUTEX-R0H3Q6N

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    7JuUygohJeRF

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      9c5d33e58b7ef0eeb97ed7fe1f74f300949e9cab6e2354b0ad1cd3dc756bfcb9

    • Size

      349KB

    • MD5

      ebef4f6c9ac0f0745df09a213224741d

    • SHA1

      25e2d51e8be6e517822833fcb435cb772dfa49a9

    • SHA256

      9c5d33e58b7ef0eeb97ed7fe1f74f300949e9cab6e2354b0ad1cd3dc756bfcb9

    • SHA512

      ecc5a3cd54b3a92f359e1628739f361a1f26c03c19b6c454482c93a1e33c583454725bbda7b5cc98ee9d8b72ae8c1bf9e6b75b1f4ca0b248d4cf1f0cdd8cf3f8

    • SSDEEP

      6144:QcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37aplvccV:QcW7KEZlPzCy372UcV

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks