General
-
Target
eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816
-
Size
350KB
-
Sample
241005-zr9txaxdkh
-
MD5
220fd88ed61a81dd7238c8385fc8c5f7
-
SHA1
b4c6ea98e705912f38816bd4aff085871b1bae80
-
SHA256
eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816
-
SHA512
355aad3cc89c3d6acaf53a7091903d6b0b4092e1f4c7bc6c41255a7aafce00d3807ddad4b5c027a0437938e17278f7a8d591a085b4e014fff8d6165fdeb6838f
-
SSDEEP
6144:hSncRldcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37wxM:Q4jcW7KEZlPzCy37
Static task
static1
Behavioral task
behavioral1
Sample
eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe
Resource
win7-20240729-en
Malware Config
Extracted
darkcomet
Guest16
sussynv83dj893.duckdns.org:1604
DC_MUTEX-RU83HNV
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MFz6heXQQ4jP
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816
-
Size
350KB
-
MD5
220fd88ed61a81dd7238c8385fc8c5f7
-
SHA1
b4c6ea98e705912f38816bd4aff085871b1bae80
-
SHA256
eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816
-
SHA512
355aad3cc89c3d6acaf53a7091903d6b0b4092e1f4c7bc6c41255a7aafce00d3807ddad4b5c027a0437938e17278f7a8d591a085b4e014fff8d6165fdeb6838f
-
SSDEEP
6144:hSncRldcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37wxM:Q4jcW7KEZlPzCy37
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2