General
-
Target
f018c0d14c1b9ef5421920538e3e0efe33c91fa3bcd7b56fde9252bf0f5b04ef
-
Size
708KB
-
Sample
241018-e5wtzsxdna
-
MD5
4cc6c28d2beacff83e9f12bfc0120565
-
SHA1
a1c8e595a6d1ac1043fe50e93d87e883d54a3fdf
-
SHA256
f018c0d14c1b9ef5421920538e3e0efe33c91fa3bcd7b56fde9252bf0f5b04ef
-
SHA512
bd8aa7e44c1e780d41af98970073c39fd399145e9cd55d05f69511aa4dcdc6d964844a128c8ea38aab0f9804466c796fec3907186b83cbac68567c035e070fc9
-
SSDEEP
12288:eIh4EY1awKtBnrtw8bzRpyMObDkeFsB7pyCEbSTiTwRkfy9h4ORA/KjWHZ1dAx9u:eFoXBnpw8bzRhObDkvEbSDKC2UmKaHZd
Static task
static1
Behavioral task
behavioral1
Sample
f018c0d14c1b9ef5421920538e3e0efe33c91fa3bcd7b56fde9252bf0f5b04ef.exe
Resource
win7-20240729-en
Malware Config
Extracted
darkcomet
Guest16
minunip.no-ip.org:99
DC_MUTEX-UZ2SU8T
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
zXVjGZvnzDQ0
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
rundll32
Targets
-
-
Target
f018c0d14c1b9ef5421920538e3e0efe33c91fa3bcd7b56fde9252bf0f5b04ef
-
Size
708KB
-
MD5
4cc6c28d2beacff83e9f12bfc0120565
-
SHA1
a1c8e595a6d1ac1043fe50e93d87e883d54a3fdf
-
SHA256
f018c0d14c1b9ef5421920538e3e0efe33c91fa3bcd7b56fde9252bf0f5b04ef
-
SHA512
bd8aa7e44c1e780d41af98970073c39fd399145e9cd55d05f69511aa4dcdc6d964844a128c8ea38aab0f9804466c796fec3907186b83cbac68567c035e070fc9
-
SSDEEP
12288:eIh4EY1awKtBnrtw8bzRpyMObDkeFsB7pyCEbSTiTwRkfy9h4ORA/KjWHZ1dAx9u:eFoXBnpw8bzRhObDkvEbSDKC2UmKaHZd
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1