General
-
Target
23e1ceefaa80c5e560dcfe6dc5f9e02f508a8bf7364c349b716711539c210264N
-
Size
252KB
-
Sample
241106-mbd13syfpm
-
MD5
3e2d8dc667ca1f54e598579a058cae50
-
SHA1
7ba1170587bd92871fe5d231f84eb299bd028048
-
SHA256
23e1ceefaa80c5e560dcfe6dc5f9e02f508a8bf7364c349b716711539c210264
-
SHA512
3399b1696380b13a0797d52df7aef51c03e92cba9fb4b12477fa9a5b69adbf258e5d7609369282f36af4e7ccd1a4a2ee96ebfbcb198565bc8afebbbbad64db52
-
SSDEEP
6144:lcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PHQ:lcWkbgTYWnYnt/IDYhP
Behavioral task
behavioral1
Sample
23e1ceefaa80c5e560dcfe6dc5f9e02f508a8bf7364c349b716711539c210264N.exe
Resource
win7-20241023-en
Malware Config
Extracted
darkcomet
Guest16
zadrot077.ddns.net:1604
192.168.1.105:1604
DC_MUTEX-XAPUZP1
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
7Tp31A087dlB
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
23e1ceefaa80c5e560dcfe6dc5f9e02f508a8bf7364c349b716711539c210264N
-
Size
252KB
-
MD5
3e2d8dc667ca1f54e598579a058cae50
-
SHA1
7ba1170587bd92871fe5d231f84eb299bd028048
-
SHA256
23e1ceefaa80c5e560dcfe6dc5f9e02f508a8bf7364c349b716711539c210264
-
SHA512
3399b1696380b13a0797d52df7aef51c03e92cba9fb4b12477fa9a5b69adbf258e5d7609369282f36af4e7ccd1a4a2ee96ebfbcb198565bc8afebbbbad64db52
-
SSDEEP
6144:lcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PHQ:lcWkbgTYWnYnt/IDYhP
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2