General

  • Target

    bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812N.exe

  • Size

    574KB

  • Sample

    250224-w2gz4axmt5

  • MD5

    517486e95bdd8edae32d2c5910cb4220

  • SHA1

    03b791914f609f6dfed43f726944b1b8ec733624

  • SHA256

    bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812

  • SHA512

    01df0e58d56edce74f2c526b392bf6cf6024f3b3f84f3c70675a242b30c6de01b64eb4f749732709898e7d65d44b61d8034de34948b45951bed8ac04708deda6

  • SSDEEP

    12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubj:zFhWAfn22m0eD1GPz8Hdxv

Malware Config

Extracted

Family

darkcomet

Botnet

Whale

C2

ygo.no-ip.info:1604

Mutex

DC_MUTEX-KF2Q2MJ

Attributes
  • gencode

    YxpcQq6jqoiB

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812N.exe

    • Size

      574KB

    • MD5

      517486e95bdd8edae32d2c5910cb4220

    • SHA1

      03b791914f609f6dfed43f726944b1b8ec733624

    • SHA256

      bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812

    • SHA512

      01df0e58d56edce74f2c526b392bf6cf6024f3b3f84f3c70675a242b30c6de01b64eb4f749732709898e7d65d44b61d8034de34948b45951bed8ac04708deda6

    • SSDEEP

      12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubj:zFhWAfn22m0eD1GPz8Hdxv

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks