General
-
Target
445072c65c94e3343cb344822504ee10
-
Size
273KB
-
Sample
240105-yrm5gahfcr
-
MD5
445072c65c94e3343cb344822504ee10
-
SHA1
c4c39e7c9f872752f60ba62364e5e832b526d5b1
-
SHA256
ada8cc55f7ffb82ebc1e00dbd591f18e9f5d0e76dffa44dec99beaf152e058cc
-
SHA512
4f87152229e7cfec95465318ccedbf2c444b0f3a8b05ca553ef475156d314594031a62e9ff9755e4b33190b6f388f5bb9ced79903174fc15228d714fc400e73a
-
SSDEEP
6144:lpZYI1Gj+Ectos06yeVt0m4heAEWxziBUdPASAQIZ+kV82/WkSh8jhtz:XJttos06Rt0m4hhJsJVQ7kFPU4htz
Static task
static1
Behavioral task
behavioral1
Sample
445072c65c94e3343cb344822504ee10.exe
Resource
win7-20231215-en
Malware Config
Extracted
darkcomet
pc
host12365485454.ddns.net:1604
192.168.0.125:1604
DC_MUTEX-Q8QDW8F
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
locQi1ySlvoS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
micro update
Targets
-
-
Target
445072c65c94e3343cb344822504ee10
-
Size
273KB
-
MD5
445072c65c94e3343cb344822504ee10
-
SHA1
c4c39e7c9f872752f60ba62364e5e832b526d5b1
-
SHA256
ada8cc55f7ffb82ebc1e00dbd591f18e9f5d0e76dffa44dec99beaf152e058cc
-
SHA512
4f87152229e7cfec95465318ccedbf2c444b0f3a8b05ca553ef475156d314594031a62e9ff9755e4b33190b6f388f5bb9ced79903174fc15228d714fc400e73a
-
SSDEEP
6144:lpZYI1Gj+Ectos06yeVt0m4heAEWxziBUdPASAQIZ+kV82/WkSh8jhtz:XJttos06Rt0m4hhJsJVQ7kFPU4htz
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2