General

  • Target

    2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader

  • Size

    527KB

  • Sample

    250417-12g3bawjz8

  • MD5

    2936e22ea8907d6f85a25b2feb62650f

  • SHA1

    3e367491a43877ccf90ec1b2a46af3153fedf8a7

  • SHA256

    e378da59a68622d81932cacab8d8193de42ee4628756dc116c74d70efb6bbb69

  • SHA512

    dee95cfc6f7e9c2060bd9f83a9466fe0f7ff543c8b9b790fee398c0133be2bf87c73a6dfdae9cca7839f1633ac104e469d3811d248f2c952ae6470a970729060

  • SSDEEP

    12288:ewK1jIDqUT8uCGUCs4eNS+mrp+3OhAICBGtnA:eGDNPCms4eNiQpjG

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:82

mjahanzaib.no-ip.org:82

Mutex

DC_MUTEX-3H9BAQL

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ptMnX4vVfS9k

  • install

    true

  • offline_keylogger

    true

  • password

    0123456789

  • persistence

    true

  • reg_key

    Sms sender

rc4.plain

Targets

    • Target

      2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader

    • Size

      527KB

    • MD5

      2936e22ea8907d6f85a25b2feb62650f

    • SHA1

      3e367491a43877ccf90ec1b2a46af3153fedf8a7

    • SHA256

      e378da59a68622d81932cacab8d8193de42ee4628756dc116c74d70efb6bbb69

    • SHA512

      dee95cfc6f7e9c2060bd9f83a9466fe0f7ff543c8b9b790fee398c0133be2bf87c73a6dfdae9cca7839f1633ac104e469d3811d248f2c952ae6470a970729060

    • SSDEEP

      12288:ewK1jIDqUT8uCGUCs4eNS+mrp+3OhAICBGtnA:eGDNPCms4eNiQpjG

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks