Behavioral task
behavioral1
Sample
cbefac498c7c8312dd71565f190ee2394ada2f86c70e41e8f03480a19442ac17.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbefac498c7c8312dd71565f190ee2394ada2f86c70e41e8f03480a19442ac17.exe
Resource
win10v2004-20240319-en
General
-
Target
cbefac498c7c8312dd71565f190ee2394ada2f86c70e41e8f03480a19442ac17.exe
-
Size
944KB
-
MD5
456a8f3855395147d46f9add1c2bab3f
-
SHA1
248eebb5a8083e7dbe4e68db09faaaef9030b1f2
-
SHA256
cbefac498c7c8312dd71565f190ee2394ada2f86c70e41e8f03480a19442ac17
-
SHA512
e385892a6c22139b700cbf42ea8ecd02328b66843feea13115546dd7901e93bcfbcdaae794272d10b16994a58cb2d1c2f78383247886c782d1c8baa4d6fb0266
-
SSDEEP
12288:sX2JVHMRtDaSm3TJvVNvWV5YTsY7tHwbz/htfcoCoK632zbK8r/:ass2Sm39NNv9wY7tHwbzfIoK6MK6
Malware Config
Extracted
darkcomet
Guest16
10.10.0.100:1604
DC_MUTEX-F54S21D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
gT3AYpfW5Hj0
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource cbefac498c7c8312dd71565f190ee2394ada2f86c70e41e8f03480a19442ac17.exe
Files
-
cbefac498c7c8312dd71565f190ee2394ada2f86c70e41e8f03480a19442ac17.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 580KB - Virtual size: 580KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE