General
-
Target
387e8c87ac61853543b43747feff0897
-
Size
515KB
-
Sample
231231-q1r6sahbc6
-
MD5
387e8c87ac61853543b43747feff0897
-
SHA1
6505a260581d6d78b3c8ca0501b56e266ac25d4f
-
SHA256
23ff4eb48f2c98a3868ee8abbfcd28427f877864759e0d84c82895b51f78e8d0
-
SHA512
5451d60875562cf41bcdd703edd7a1efde19b1ed86f7a78f69a52e8d05b34b437e9704ed1c576d54e364c55a66274922f09138d220d30d675c17418967a16e29
-
SSDEEP
12288:wf2QkXEU9Nha3ZqyBPoMrliN/ddRAe8CT:QxeEo+LBPorzRAe7T
Static task
static1
Behavioral task
behavioral1
Sample
387e8c87ac61853543b43747feff0897.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
387e8c87ac61853543b43747feff0897.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
darkcomet
DC
rsguide.no-ip.biz:1604
DC_MUTEX-9USF8JU
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
RvWB7ovy3Ji4
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
rundll32
Targets
-
-
Target
387e8c87ac61853543b43747feff0897
-
Size
515KB
-
MD5
387e8c87ac61853543b43747feff0897
-
SHA1
6505a260581d6d78b3c8ca0501b56e266ac25d4f
-
SHA256
23ff4eb48f2c98a3868ee8abbfcd28427f877864759e0d84c82895b51f78e8d0
-
SHA512
5451d60875562cf41bcdd703edd7a1efde19b1ed86f7a78f69a52e8d05b34b437e9704ed1c576d54e364c55a66274922f09138d220d30d675c17418967a16e29
-
SSDEEP
12288:wf2QkXEU9Nha3ZqyBPoMrliN/ddRAe8CT:QxeEo+LBPorzRAe7T
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1