General
-
Target
172af0ea71ebe1942681d48eba3418a5d5cd243dd9b4248407c3201146894c86
-
Size
338KB
-
Sample
240418-xyx3ksdf4x
-
MD5
27aed8242c89f5a513c097dcc36c5bef
-
SHA1
9a53be98d594fabed2fc567e65b7b16d73b69300
-
SHA256
172af0ea71ebe1942681d48eba3418a5d5cd243dd9b4248407c3201146894c86
-
SHA512
8f81c85b4653096ccaca23a706527130eecd2a226c111db44138577efcd5446415fe5ebadf12e71361bd5e267f5436bd2f1dc4255e20e1fc55974f630e80b478
-
SSDEEP
6144:wC4W+NSe7/mE5WAGb/msFw13ocRGQqrDsZOZ3ZpWoM7+aaTaaaHbiXJEdpC8bQ:w/W+cHEIAGb/msFwxocgQq3sZOZIbuq
Static task
static1
Behavioral task
behavioral1
Sample
172af0ea71ebe1942681d48eba3418a5d5cd243dd9b4248407c3201146894c86.exe
Resource
win7-20240221-en
Malware Config
Extracted
darkcomet
Slave
gotcha1337.no-ip.biz:1604
DC_MUTEX-YL1K3PD
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
KFeuKKdTKtY3
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
172af0ea71ebe1942681d48eba3418a5d5cd243dd9b4248407c3201146894c86
-
Size
338KB
-
MD5
27aed8242c89f5a513c097dcc36c5bef
-
SHA1
9a53be98d594fabed2fc567e65b7b16d73b69300
-
SHA256
172af0ea71ebe1942681d48eba3418a5d5cd243dd9b4248407c3201146894c86
-
SHA512
8f81c85b4653096ccaca23a706527130eecd2a226c111db44138577efcd5446415fe5ebadf12e71361bd5e267f5436bd2f1dc4255e20e1fc55974f630e80b478
-
SSDEEP
6144:wC4W+NSe7/mE5WAGb/msFw13ocRGQqrDsZOZ3ZpWoM7+aaTaaaHbiXJEdpC8bQ:w/W+cHEIAGb/msFwxocgQq3sZOZIbuq
-
Modifies WinLogon for persistence
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1