General

  • Target

    9063a7361e3b891e9692af5b87de8fd65e14894f75ae4a0069e732446e5d47fbN.exe

  • Size

    306KB

  • Sample

    250323-xazlhavl15

  • MD5

    96cf8a8e1a535ce7aabd257142b2d240

  • SHA1

    b18c90bda95cbf32f7ab1970868952cfcaab3273

  • SHA256

    9063a7361e3b891e9692af5b87de8fd65e14894f75ae4a0069e732446e5d47fb

  • SHA512

    89ee8c8aa55f2ba1e06b0ea278432bf51a149d198b56ca9d4c2437d31e90bc25a2e2d3e14dbd58cfa5aba483ef43a9cf48154f89ef1ef1e0eb5ec30e3152c682

  • SSDEEP

    6144:uuQDRdq7Ww4MthMtPckBP6T08z/zxWPxZuuOyU:uu2Rw7WwREzolWZZuvR

Malware Config

Extracted

Family

darkcomet

Botnet

FarCry

C2

octopus01.airdns.org:2404

octopus01.ddns.net:2404

Mutex

DC_MUTEX-YGBUNDC

Attributes
  • InstallPath

    Ubisoft\FarCry\FCupdate.exe

  • gencode

    jv2Y4dfih9vp

  • install

    true

  • offline_keylogger

    true

  • password

    V10tt0PC

  • persistence

    true

  • reg_key

    FCUpdate

rc4.plain

Targets

    • Target

      9063a7361e3b891e9692af5b87de8fd65e14894f75ae4a0069e732446e5d47fbN.exe

    • Size

      306KB

    • MD5

      96cf8a8e1a535ce7aabd257142b2d240

    • SHA1

      b18c90bda95cbf32f7ab1970868952cfcaab3273

    • SHA256

      9063a7361e3b891e9692af5b87de8fd65e14894f75ae4a0069e732446e5d47fb

    • SHA512

      89ee8c8aa55f2ba1e06b0ea278432bf51a149d198b56ca9d4c2437d31e90bc25a2e2d3e14dbd58cfa5aba483ef43a9cf48154f89ef1ef1e0eb5ec30e3152c682

    • SSDEEP

      6144:uuQDRdq7Ww4MthMtPckBP6T08z/zxWPxZuuOyU:uu2Rw7WwREzolWZZuvR

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks