General
-
Target
yooo.exe
-
Size
658KB
-
Sample
241117-d7hvgazgrf
-
MD5
677d14c29be05629a77415b842492b76
-
SHA1
6b491eca627cb457414262cc9d417fab81b4db67
-
SHA256
e65037238450eabc137cd356dcc62b16db53db61531154e64ca00acfd00e0213
-
SHA512
de64f10a8c41488d3c88bd5edeaf530954a762a0ee1b49873b82a45604a7e7eb91c18569f8dec23e1129f9b52a312b9992508d948e60ee85dc71f2d498285f3f
-
SSDEEP
12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h3:+Z1xuVVjfFoynPaVBUR8f+kN10EB5
Behavioral task
behavioral1
Sample
yooo.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16_min
10.211.55.25:1604
DCMIN_MUTEX-410US0Y
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
41iAjvfv0Zir
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
yooo.exe
-
Size
658KB
-
MD5
677d14c29be05629a77415b842492b76
-
SHA1
6b491eca627cb457414262cc9d417fab81b4db67
-
SHA256
e65037238450eabc137cd356dcc62b16db53db61531154e64ca00acfd00e0213
-
SHA512
de64f10a8c41488d3c88bd5edeaf530954a762a0ee1b49873b82a45604a7e7eb91c18569f8dec23e1129f9b52a312b9992508d948e60ee85dc71f2d498285f3f
-
SSDEEP
12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h3:+Z1xuVVjfFoynPaVBUR8f+kN10EB5
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1