General
-
Target
ce6c774bcbcb08ee2e11a539a45e70afc1282d04970d52b42020d8c761173b49
-
Size
291KB
-
Sample
240417-p6pgeagb63
-
MD5
01513add1d9e805de24784913a252e3f
-
SHA1
56b34582a34a41a9da3b680fdbe7136a2b343b4e
-
SHA256
ce6c774bcbcb08ee2e11a539a45e70afc1282d04970d52b42020d8c761173b49
-
SHA512
f774adc5baad09f3112dca3c088911246fc23a43b831069da12db06de741f75dede47b0b5f69189c71a138355705075f329ae31f446bc45fb16e9a068706e0eb
-
SSDEEP
6144:ySpeh1zgHkZxm3Dsfo5hHaWA63t40bcj3zNRhWjtKy1f:Fp7EruDsfMhHaWdFbIIjc6
Static task
static1
Behavioral task
behavioral1
Sample
eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe
Resource
win7-20240221-en
Malware Config
Extracted
darkcomet
Guest16
sussynv83dj893.duckdns.org:1604
DC_MUTEX-RU83HNV
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MFz6heXQQ4jP
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe
-
Size
350KB
-
MD5
220fd88ed61a81dd7238c8385fc8c5f7
-
SHA1
b4c6ea98e705912f38816bd4aff085871b1bae80
-
SHA256
eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816
-
SHA512
355aad3cc89c3d6acaf53a7091903d6b0b4092e1f4c7bc6c41255a7aafce00d3807ddad4b5c027a0437938e17278f7a8d591a085b4e014fff8d6165fdeb6838f
-
SSDEEP
6144:hSncRldcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37wxM:Q4jcW7KEZlPzCy37
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1