General
-
Target
9153d1a2f2fe00b04462eb405d02754fecba082bcde45799dd1a53c994d75195
-
Size
350KB
-
Sample
240406-3cl13sef85
-
MD5
7dee9ee8a1f01c84a03eec97edfefa90
-
SHA1
6ca55a33d811d84fedbff9278f2f8918284f5713
-
SHA256
9153d1a2f2fe00b04462eb405d02754fecba082bcde45799dd1a53c994d75195
-
SHA512
9efbf52874dcfc2a2c48dfb6894ffc3c4d9d02ca441260968886500cdfddc5e5bab51ff5b79117cb336aaa45f0206bfdfe60a7d8b04733192c9b732462920e22
-
SSDEEP
6144:WMI/jlS4kCwHL76nz9Q3uR5LTYYBIsHHN:WMQlS9Cwr79uLLTvBIY
Behavioral task
behavioral1
Sample
9153d1a2f2fe00b04462eb405d02754fecba082bcde45799dd1a53c994d75195.exe
Resource
win7-20240221-en
Malware Config
Extracted
darkcomet
Guest16
10.10.0.100:1604
DC_MUTEX-30LAHYZ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
al7BRWGr7y55
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
9153d1a2f2fe00b04462eb405d02754fecba082bcde45799dd1a53c994d75195
-
Size
350KB
-
MD5
7dee9ee8a1f01c84a03eec97edfefa90
-
SHA1
6ca55a33d811d84fedbff9278f2f8918284f5713
-
SHA256
9153d1a2f2fe00b04462eb405d02754fecba082bcde45799dd1a53c994d75195
-
SHA512
9efbf52874dcfc2a2c48dfb6894ffc3c4d9d02ca441260968886500cdfddc5e5bab51ff5b79117cb336aaa45f0206bfdfe60a7d8b04733192c9b732462920e22
-
SSDEEP
6144:WMI/jlS4kCwHL76nz9Q3uR5LTYYBIsHHN:WMQlS9Cwr79uLLTvBIY
-
Modifies WinLogon for persistence
-
UPX dump on OEP (original entry point)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1