General
-
Target
0aa53c306f231af2bc7097242847e6603b2856d97aa49b36cff179d645d1dd58.exe
-
Size
3MB
-
Sample
230706-q4nmrsbh23
-
MD5
6fe53a251f6e9b6deda81229abf29e49
-
SHA1
663063a6d3b72f8652f3bf01d5ba060a9ca4e1d2
-
SHA256
0aa53c306f231af2bc7097242847e6603b2856d97aa49b36cff179d645d1dd58
-
SHA512
e5b0c8263e9d3850ef592454b892fc09c39b5d91622f7ca5f40b0cb019c1ba2bd09a453c854b7583ae5bd8852f7f5c4af5a31e3f72ba4d530e55886acc1edac2
-
SSDEEP
98304:3dxPig9KbLS7NYH0VwxA0WjgeG68Nq9Hr2839Y2YXC8bx7wwI3nwiY4gZcafQm6Y:3PigkiH3Fa
Static task
static1
Behavioral task
behavioral1
Sample
0aa53c306f231af2bc7097242847e6603b2856d97aa49b36cff179d645d1dd58.exe
Resource
win7-20230703-en
Malware Config
Extracted
darkcomet
JUNE 2023
timmy08.ddns.net:39399
DC_MUTEX-23X1DZM
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Rn451shW1Y0e
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
chrome
Targets
-
-
Target
0aa53c306f231af2bc7097242847e6603b2856d97aa49b36cff179d645d1dd58.exe
-
Size
3MB
-
MD5
6fe53a251f6e9b6deda81229abf29e49
-
SHA1
663063a6d3b72f8652f3bf01d5ba060a9ca4e1d2
-
SHA256
0aa53c306f231af2bc7097242847e6603b2856d97aa49b36cff179d645d1dd58
-
SHA512
e5b0c8263e9d3850ef592454b892fc09c39b5d91622f7ca5f40b0cb019c1ba2bd09a453c854b7583ae5bd8852f7f5c4af5a31e3f72ba4d530e55886acc1edac2
-
SSDEEP
98304:3dxPig9KbLS7NYH0VwxA0WjgeG68Nq9Hr2839Y2YXC8bx7wwI3nwiY4gZcafQm6Y:3PigkiH3Fa
-
Modifies WinLogon for persistence
-
Modifies security service
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-