General
-
Target
706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277dN.exe
-
Size
304KB
-
Sample
241128-n7rsgssnfl
-
MD5
342bda490672d77622a6917ccecdab20
-
SHA1
3bb653874418bb2a3666f2ca39710d97b1bfa871
-
SHA256
706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277d
-
SHA512
a5d0ab425b723165072ebcfbd65cd05e464a83774dd24a30a10a10654d068006bd06dfc92f1b88010ebd05c4f629a43b18b5331669a1ee9fc8d5f66572dfbe7b
-
SSDEEP
6144:X2T/3If9vSuNT6woPu7pWil15P0Wrep5h05X/CpNWpyJoNCzh:XQ3ICaEil16Cs5u1974V
Static task
static1
Behavioral task
behavioral1
Sample
706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277dN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
Guest16_min
2.235.168.213:81
DCMIN_MUTEX-JSD8YH2
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
7fsLUSe9cMso
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
210978
Targets
-
-
Target
706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277dN.exe
-
Size
304KB
-
MD5
342bda490672d77622a6917ccecdab20
-
SHA1
3bb653874418bb2a3666f2ca39710d97b1bfa871
-
SHA256
706846d99683044c8f5fbea2897c007a55c4cbdba64f76a02bfe80ce9fde277d
-
SHA512
a5d0ab425b723165072ebcfbd65cd05e464a83774dd24a30a10a10654d068006bd06dfc92f1b88010ebd05c4f629a43b18b5331669a1ee9fc8d5f66572dfbe7b
-
SSDEEP
6144:X2T/3If9vSuNT6woPu7pWil15P0Wrep5h05X/CpNWpyJoNCzh:XQ3ICaEil16Cs5u1974V
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1