General
-
Target
logger.exe
-
Size
659KB
-
Sample
230915-rdspgafb63
-
MD5
60ebe2937796ecd5c14c4bbb1663de20
-
SHA1
1696ee15de1667bb58e46838446aca457ac5c48c
-
SHA256
22a3fd6f009576f4ef519c5cd268134fd25dcb642406509762e36c08f5265d5f
-
SHA512
129cc6e686a12ed20a9968acd05bc7f0da5c6e55b31a41f70e1b3351af43c1e879ba0a6c766e456bdf2d44cfc11ecf3774dafd351d6e8214cae6ca24e6c82d0f
-
SSDEEP
12288:G9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hv:iZ1xuVVjfFoynPaVBUR8f+kN10EBV
Behavioral task
behavioral1
Sample
logger.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
logger.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
darkcomet
snowy.ddns.net:80
DC_MUTEX-ANWWFCY
-
InstallPath
\CloudService\cloud.exe
-
gencode
02Yt75CfAaPW
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
logger.exe
-
Size
659KB
-
MD5
60ebe2937796ecd5c14c4bbb1663de20
-
SHA1
1696ee15de1667bb58e46838446aca457ac5c48c
-
SHA256
22a3fd6f009576f4ef519c5cd268134fd25dcb642406509762e36c08f5265d5f
-
SHA512
129cc6e686a12ed20a9968acd05bc7f0da5c6e55b31a41f70e1b3351af43c1e879ba0a6c766e456bdf2d44cfc11ecf3774dafd351d6e8214cae6ca24e6c82d0f
-
SSDEEP
12288:G9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hv:iZ1xuVVjfFoynPaVBUR8f+kN10EBV
Score10/10-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1