General

  • Target

    68b5724614943efc6e393be7d55fcd7b7c6d4640764abcc51e504ce800da286a

  • Size

    838KB

  • Sample

    240621-2el87axaml

  • MD5

    66f3b3833902264db9ef07ca2f83ff52

  • SHA1

    d3da2491ce5db90511b5896932a688e800dd620b

  • SHA256

    68b5724614943efc6e393be7d55fcd7b7c6d4640764abcc51e504ce800da286a

  • SHA512

    2b56e45bc1411a7335ff3cf467a3acaae3c21ce92ebe8e87c8a5f93a6bc145d7cc12f1d98e088c104cef9741ae44640e50f293fad7b24173f9aab0a0ac5d1dfe

  • SSDEEP

    24576:rZ1xuVVjfFoynPaVBUR8f+kN10EB/+xicXD0QZh9uA:NQDgok30SPckA

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.124.129:1604

Mutex

DC_MUTEX-GHUCMYM

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    s648XXfZuZ4D

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      68b5724614943efc6e393be7d55fcd7b7c6d4640764abcc51e504ce800da286a

    • Size

      838KB

    • MD5

      66f3b3833902264db9ef07ca2f83ff52

    • SHA1

      d3da2491ce5db90511b5896932a688e800dd620b

    • SHA256

      68b5724614943efc6e393be7d55fcd7b7c6d4640764abcc51e504ce800da286a

    • SHA512

      2b56e45bc1411a7335ff3cf467a3acaae3c21ce92ebe8e87c8a5f93a6bc145d7cc12f1d98e088c104cef9741ae44640e50f293fad7b24173f9aab0a0ac5d1dfe

    • SSDEEP

      24576:rZ1xuVVjfFoynPaVBUR8f+kN10EB/+xicXD0QZh9uA:NQDgok30SPckA

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks