General

  • Target

    5e95ac29974541f3cf409d7ca483033c991e644b04f8d2dba7c2e08941511a22

  • Size

    809KB

  • Sample

    250420-x2pklsssh1

  • MD5

    07d68d796e9826b00e03351cfd87e3e3

  • SHA1

    2cd1f0484b5c798fc29170be9808f43e8b50daf3

  • SHA256

    5e95ac29974541f3cf409d7ca483033c991e644b04f8d2dba7c2e08941511a22

  • SHA512

    bb83e56d564046f27f36757c207e45a5577142093271d4957ba4d35c18019d02b3630da10d19aad60f0d0f8655223fe9d172b87d50a61b6dbc9b3c881b7db096

  • SSDEEP

    24576:V64hcVh/mMmO6HDMNTJBOl0ZRPyMBqooVQn6pMhhQ:Agqh8ljMNHOlyP/oVQ6pUQ

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

nanocore

Version

1.2.2.0

C2

jvjv2044duck33.duckdns.org:54984

Mutex

2fda0c27-65af-4514-b648-0066e7bbf615

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    jvjv2044duck33.duckdns.org

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2025-01-27T20:01:11.197098036Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    54984

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    2fda0c27-65af-4514-b648-0066e7bbf615

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    jvjv2044duck33.duckdns.org

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Extracted

Family

darkcomet

Botnet

Guest16

C2

jvjv2044duck33.duckdns.org:1604

Mutex

DC_MUTEX-3VMZ2C8

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ttgTbZWj82S9

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

jvjv2044duck33.duckdns.org:8808

Mutex

0fC8zJGwBBNm

Attributes
  • delay

    3

  • install

    true

  • install_file

    csrss.exe

  • install_folder

    %AppData%

aes.plain

Targets

MITRE ATT&CK Enterprise v16

Tasks

static1

nanocoredarkcomet
Score
10/10

behavioral1

darkcometnanocoreguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojanupx
Score
10/10

behavioral2

darkcometnanocoreguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojanupx
Score
10/10

behavioral3

asyncratdarkcometnanocoredefaultguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojan
Score
10/10

behavioral4

asyncratdarkcometnanocoredefaultguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojan
Score
10/10

behavioral5

asyncratdarkcometnanocoredefaultguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojan
Score
10/10

behavioral6

asyncratdarkcometnanocoredefaultguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojan
Score
10/10

behavioral7

asyncratdarkcometnanocoredefaultguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojan
Score
10/10

behavioral8

asyncratdarkcometnanocoredefaultguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojan
Score
10/10

behavioral9

asyncratdarkcometnanocoredefaultguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojanupx
Score
10/10

behavioral10

asyncratdarkcometnanocoredefaultguest16defense_evasiondiscoverykeyloggerpersistenceratspywarestealertrojanupx
Score
10/10