General
-
Target
899837875a8518ca77e909aea58a5670exe_JC.exe
-
Size
283KB
-
Sample
230916-v1emxacb4z
-
MD5
899837875a8518ca77e909aea58a5670
-
SHA1
3f756582937017f84691bc0c76895a2e51052c12
-
SHA256
560d6bb6ba9ae2cb68d4126425e062d9dfbcb015b584b249e068a8be2e90e55c
-
SHA512
4be644fcbb9e1fe3eea7b63d1d1b5d8450a44fcdf996dfc5f69e7c921ba48fbc33d015bfa8c3cc7db8145bbaa9ec7d501ea65b255ae21c78dcbc4938cbeccdaa
-
SSDEEP
6144:scNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PIhp8T:scWkbgTYWnYnt/IDYhPMp8T
Behavioral task
behavioral1
Sample
899837875a8518ca77e909aea58a5670exe_JC.exe
Resource
win7-20230831-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
193.107.72.82:1604
cs-gocheats.ddns.net:1604
cs-gocheats.ddns.net:81
192.168.88.200:81
192.168.88.200:1604
DC_MUTEX-J4EMRRZ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
SeZXiGzTJYBx
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
899837875a8518ca77e909aea58a5670exe_JC.exe
-
Size
283KB
-
MD5
899837875a8518ca77e909aea58a5670
-
SHA1
3f756582937017f84691bc0c76895a2e51052c12
-
SHA256
560d6bb6ba9ae2cb68d4126425e062d9dfbcb015b584b249e068a8be2e90e55c
-
SHA512
4be644fcbb9e1fe3eea7b63d1d1b5d8450a44fcdf996dfc5f69e7c921ba48fbc33d015bfa8c3cc7db8145bbaa9ec7d501ea65b255ae21c78dcbc4938cbeccdaa
-
SSDEEP
6144:scNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PIhp8T:scWkbgTYWnYnt/IDYhPMp8T
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2