General
-
Target
af42c9c8dbe06b86b405ebafd55d3683ef50756422193154797c089d6fc056fe
-
Size
691KB
-
Sample
240726-ch9ffssfrd
-
MD5
e2d5c62c52be4b7a373943783d03d8b1
-
SHA1
3a115983e2ac0b94982ad5c9e701225151875ca6
-
SHA256
af42c9c8dbe06b86b405ebafd55d3683ef50756422193154797c089d6fc056fe
-
SHA512
78d179ac338bb9e78909aadb1ffa7cc7fc4b9c4136dc1fb14e8c63916f6b7da93722aa7dccf7afdc05548d3657ea7c95608a4a60fee6a3b09418b78f5074b64e
-
SSDEEP
12288:Y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/O:MZ1xuVVjfFoynPaVBUR8f+kN10Ed
Behavioral task
behavioral1
Sample
af42c9c8dbe06b86b405ebafd55d3683ef50756422193154797c089d6fc056fe.exe
Resource
win7-20240704-en
Malware Config
Extracted
darkcomet
Guest16
jvjv2044duck33.duckdns.org:1604
DC_MUTEX-U9J0V31
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
4xYePg256T0S
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
WindowsTemp
Targets
-
-
Target
af42c9c8dbe06b86b405ebafd55d3683ef50756422193154797c089d6fc056fe
-
Size
691KB
-
MD5
e2d5c62c52be4b7a373943783d03d8b1
-
SHA1
3a115983e2ac0b94982ad5c9e701225151875ca6
-
SHA256
af42c9c8dbe06b86b405ebafd55d3683ef50756422193154797c089d6fc056fe
-
SHA512
78d179ac338bb9e78909aadb1ffa7cc7fc4b9c4136dc1fb14e8c63916f6b7da93722aa7dccf7afdc05548d3657ea7c95608a4a60fee6a3b09418b78f5074b64e
-
SSDEEP
12288:Y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/O:MZ1xuVVjfFoynPaVBUR8f+kN10Ed
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2