General
-
Target
d9e81eebda7fdfa6bd3b2595f935a4da328ca59e0b33ebf5a9df3043af9df0e0N.exe
-
Size
690KB
-
Sample
241130-rp7b1azqdj
-
MD5
e0252fb44429d388a10f814121992b30
-
SHA1
3bbe00564cace10ec07a242731e52530b5d43a03
-
SHA256
d9e81eebda7fdfa6bd3b2595f935a4da328ca59e0b33ebf5a9df3043af9df0e0
-
SHA512
291e4c65d1f84a6617ad6a5c8ab3a75fac6d8da0575f172543d696ff8734b96031644de15c0a87331a3a5a456a678cdd0ecb9c530450ebe5f246f1364c0782ae
-
SSDEEP
12288:J9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hRd:TZ1xuVVjfFoynPaVBUR8f+kN10EBB
Behavioral task
behavioral1
Sample
d9e81eebda7fdfa6bd3b2595f935a4da328ca59e0b33ebf5a9df3043af9df0e0N.exe
Resource
win7-20240729-en
Malware Config
Extracted
darkcomet
Guest16
buttars0070.no-ip.org:200
DC_MUTEX-C1L3QWS
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Xdt6t605B39w
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
rundll32
Targets
-
-
Target
d9e81eebda7fdfa6bd3b2595f935a4da328ca59e0b33ebf5a9df3043af9df0e0N.exe
-
Size
690KB
-
MD5
e0252fb44429d388a10f814121992b30
-
SHA1
3bbe00564cace10ec07a242731e52530b5d43a03
-
SHA256
d9e81eebda7fdfa6bd3b2595f935a4da328ca59e0b33ebf5a9df3043af9df0e0
-
SHA512
291e4c65d1f84a6617ad6a5c8ab3a75fac6d8da0575f172543d696ff8734b96031644de15c0a87331a3a5a456a678cdd0ecb9c530450ebe5f246f1364c0782ae
-
SSDEEP
12288:J9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hRd:TZ1xuVVjfFoynPaVBUR8f+kN10EBB
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1