General
-
Target
3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafdeN
-
Size
929KB
-
Sample
241109-ev1eesxejh
-
MD5
92ff8539eb093582609a7a8083f38930
-
SHA1
fde8cc65fdd5ab825f1be7daa9c9e422d32a3c7f
-
SHA256
3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafde
-
SHA512
bd3303b7b73b0e2460db1cbd2428b3e55ed56d8c6258d016613c762190a3196ecfade2c98ba59a23e207a67c9efa67b3e0da880bc299020eb4130a6092a024fd
-
SSDEEP
24576:I+QawCFbpfu2X0UOkcBk8NPktcNrUBC0lyE:YjupvOzpZSrX
Static task
static1
Behavioral task
behavioral1
Sample
3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafdeN.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
TP
eviloton.no-ip.biz:1604
DCMIN_MUTEX-QZP3U75
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
hrLBKzjjkYGB
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafdeN
-
Size
929KB
-
MD5
92ff8539eb093582609a7a8083f38930
-
SHA1
fde8cc65fdd5ab825f1be7daa9c9e422d32a3c7f
-
SHA256
3d0e1f7330885586e1cdeeeee34a224ace2c9ffadbbcad2aa7d15caf637eafde
-
SHA512
bd3303b7b73b0e2460db1cbd2428b3e55ed56d8c6258d016613c762190a3196ecfade2c98ba59a23e207a67c9efa67b3e0da880bc299020eb4130a6092a024fd
-
SSDEEP
24576:I+QawCFbpfu2X0UOkcBk8NPktcNrUBC0lyE:YjupvOzpZSrX
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1