General
-
Target
201a2a3fea59997395e53238d65ea07d7b5818dd7c2d6462420bf3c0b63cfed9N.exe
-
Size
9.2MB
-
Sample
241117-2xj7jsvnbr
-
MD5
8fcc43370d7bdc75cf0381164a6bee50
-
SHA1
af7c3b094d2c5cbd153b8fa6815418eb28d7ddbd
-
SHA256
201a2a3fea59997395e53238d65ea07d7b5818dd7c2d6462420bf3c0b63cfed9
-
SHA512
137a418afed97a79352a6981b91793bfecd9026f6b5bc45c5268ad60aa1d1d6e6095571bdec0a8103ce8087ec41ed5ae387b43c26ede02c91dea4962030e6368
-
SSDEEP
196608:ltqD/NMreh/CtTODi/hXFufhOAjXhC01/oicfjRx2g/6GN4Br:cVMmDi/ojFC0qicLR0gCG6V
Static task
static1
Behavioral task
behavioral1
Sample
201a2a3fea59997395e53238d65ea07d7b5818dd7c2d6462420bf3c0b63cfed9N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
201a2a3fea59997395e53238d65ea07d7b5818dd7c2d6462420bf3c0b63cfed9N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
don
victoire.dyndns.biz:62955
DC_MUTEX-DUXZFBC
-
gencode
pZpvGTDgPY6R
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
201a2a3fea59997395e53238d65ea07d7b5818dd7c2d6462420bf3c0b63cfed9N.exe
-
Size
9.2MB
-
MD5
8fcc43370d7bdc75cf0381164a6bee50
-
SHA1
af7c3b094d2c5cbd153b8fa6815418eb28d7ddbd
-
SHA256
201a2a3fea59997395e53238d65ea07d7b5818dd7c2d6462420bf3c0b63cfed9
-
SHA512
137a418afed97a79352a6981b91793bfecd9026f6b5bc45c5268ad60aa1d1d6e6095571bdec0a8103ce8087ec41ed5ae387b43c26ede02c91dea4962030e6368
-
SSDEEP
196608:ltqD/NMreh/CtTODi/hXFufhOAjXhC01/oicfjRx2g/6GN4Br:cVMmDi/ojFC0qicLR0gCG6V
-
Darkcomet family
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1