General
-
Target
168d2bb706157fa1f41824f8ab3c8cac5468a846aafc1118b8ff183c2457bb61N
-
Size
391KB
-
Sample
241019-2seq9stere
-
MD5
43c5419faeff6243e80fb6858d21e370
-
SHA1
ec04d2603326fcb80c37ec5cca7236d7d19c0d15
-
SHA256
168d2bb706157fa1f41824f8ab3c8cac5468a846aafc1118b8ff183c2457bb61
-
SHA512
509ec525d15589bbe38c61efdfce4e63639525e0dcfa8edac4bb1f38d938e2c5cb03caa9d7423bfe7b1abe37606c447587c722efd26aa688326fc9a9c4a069bb
-
SSDEEP
6144:ARuMeWvIiqxLxDcKETsiR3vYFD6TtHxaefCPlh4XQCZ2bfjOAKdiFYuRWh:ieWvIfrDchsixvgEtHcj3vfbyL
Static task
static1
Behavioral task
behavioral1
Sample
168d2bb706157fa1f41824f8ab3c8cac5468a846aafc1118b8ff183c2457bb61N.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
delaye76.no-ip.biz:1604
DC_MUTEX-1S484EP
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Jcne53J3qPl9
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
����������.b
Targets
-
-
Target
168d2bb706157fa1f41824f8ab3c8cac5468a846aafc1118b8ff183c2457bb61N
-
Size
391KB
-
MD5
43c5419faeff6243e80fb6858d21e370
-
SHA1
ec04d2603326fcb80c37ec5cca7236d7d19c0d15
-
SHA256
168d2bb706157fa1f41824f8ab3c8cac5468a846aafc1118b8ff183c2457bb61
-
SHA512
509ec525d15589bbe38c61efdfce4e63639525e0dcfa8edac4bb1f38d938e2c5cb03caa9d7423bfe7b1abe37606c447587c722efd26aa688326fc9a9c4a069bb
-
SSDEEP
6144:ARuMeWvIiqxLxDcKETsiR3vYFD6TtHxaefCPlh4XQCZ2bfjOAKdiFYuRWh:ieWvIfrDchsixvgEtHcj3vfbyL
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1