General

  • Target

    48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69N.exe

  • Size

    576KB

  • Sample

    250323-f9grasvls3

  • MD5

    df697cf4cfada8ea190ec0b241f77180

  • SHA1

    d0eaea95cf2e772f65d730bf2b8854fea0f69b0a

  • SHA256

    48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69

  • SHA512

    49c9cc335608837e384a388c6185507d9ee863f24fbe59ae1fedd440f90500c01e6a923270ebbb75a6247b9f67538afc9b6ceec4f7c528701adbbf7ee27b81d0

  • SSDEEP

    12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSx:+NWPkHlUfBgpuPdWzyuDTifgyWlo

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

ToaksBitch

C2

letsgoboom.no-ip.info:1604

Mutex

DC_MUTEX-ADL2HN0

Attributes
  • gencode

    vwp1Z9lmZ3Pj

  • install

    false

  • offline_keylogger

    true

  • password

    runescaped

  • persistence

    false

rc4.plain

Targets

    • Target

      48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69N.exe

    • Size

      576KB

    • MD5

      df697cf4cfada8ea190ec0b241f77180

    • SHA1

      d0eaea95cf2e772f65d730bf2b8854fea0f69b0a

    • SHA256

      48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69

    • SHA512

      49c9cc335608837e384a388c6185507d9ee863f24fbe59ae1fedd440f90500c01e6a923270ebbb75a6247b9f67538afc9b6ceec4f7c528701adbbf7ee27b81d0

    • SSDEEP

      12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSx:+NWPkHlUfBgpuPdWzyuDTifgyWlo

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks