General
-
Target
421e48716838b07749b30132827cd63bf478e7f3a59fc5517a5d8df5537689a6N
-
Size
1.3MB
-
Sample
241106-g36brawejq
-
MD5
b3242661967006ba6f655869554c3f20
-
SHA1
3df8fab6dc60e7d22d46fe21236bfbfd1434a77f
-
SHA256
421e48716838b07749b30132827cd63bf478e7f3a59fc5517a5d8df5537689a6
-
SHA512
28f6cabeec727a105e96a57e13e220865d80916a1f3fb762bcc9d33a8408a26d0e661a9a5a620eb471b0b9b54697cd83ff91e4c99ddc420ebb1fe5fa642756f5
-
SSDEEP
24576:oRmJkcoQricOIQxiZY1ianytXiVgxSJ2+lCVSWZlkhDyI6t8DB6btGF1/ATNNJ3:NJZoQrbTFZY1ianUiWxSJuplkZVlIbEw
Static task
static1
Behavioral task
behavioral1
Sample
421e48716838b07749b30132827cd63bf478e7f3a59fc5517a5d8df5537689a6N.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
Guest16
ipresolver.zapto.org:1604
DC_MUTEX-1X48CDE
-
InstallPath
Skype/Skype.exe
-
gencode
VSt3RyM0B19F
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Skype
Targets
-
-
Target
421e48716838b07749b30132827cd63bf478e7f3a59fc5517a5d8df5537689a6N
-
Size
1.3MB
-
MD5
b3242661967006ba6f655869554c3f20
-
SHA1
3df8fab6dc60e7d22d46fe21236bfbfd1434a77f
-
SHA256
421e48716838b07749b30132827cd63bf478e7f3a59fc5517a5d8df5537689a6
-
SHA512
28f6cabeec727a105e96a57e13e220865d80916a1f3fb762bcc9d33a8408a26d0e661a9a5a620eb471b0b9b54697cd83ff91e4c99ddc420ebb1fe5fa642756f5
-
SSDEEP
24576:oRmJkcoQricOIQxiZY1ianytXiVgxSJ2+lCVSWZlkhDyI6t8DB6btGF1/ATNNJ3:NJZoQrbTFZY1ianUiWxSJuplkZVlIbEw
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
8