General
-
Target
ExploitDownloader.exe
-
Size
27KB
-
Sample
241201-zj7dta1ne1
-
MD5
d363863c21f0d453eaaa438f00027554
-
SHA1
7ba078266d3151068b500b9ce8cc4e579ad84a4a
-
SHA256
12eafe77459f406a8187cb7675249dfed1b214f47eff60d1291b42ed00c576e4
-
SHA512
1ff53e7a3f6eee3b99111a79bded3106fb809bd494b23839a5790a78f8b6baedbfaa707a16ceda481f93edde4d9b8bae06f12c444e16f7def5ce06f297f2bc37
-
SSDEEP
384:SsuozKPc0cDxRHXLRq418p/d6tVqQ4m9lHM1UopuJE5UjovhObRZUbjMUWDBVhIB:TLLIXTEs1Urjov4RScUWD7hq7W2e0W0
Static task
static1
Behavioral task
behavioral1
Sample
ExploitDownloader.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
Guest16
147.185.221.24:14161
RO_MUTEX-QFYD2RJ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
scW2Kk9yHEWs
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
GoogleDebugJ
Targets
-
-
Target
ExploitDownloader.exe
-
Size
27KB
-
MD5
d363863c21f0d453eaaa438f00027554
-
SHA1
7ba078266d3151068b500b9ce8cc4e579ad84a4a
-
SHA256
12eafe77459f406a8187cb7675249dfed1b214f47eff60d1291b42ed00c576e4
-
SHA512
1ff53e7a3f6eee3b99111a79bded3106fb809bd494b23839a5790a78f8b6baedbfaa707a16ceda481f93edde4d9b8bae06f12c444e16f7def5ce06f297f2bc37
-
SSDEEP
384:SsuozKPc0cDxRHXLRq418p/d6tVqQ4m9lHM1UopuJE5UjovhObRZUbjMUWDBVhIB:TLLIXTEs1Urjov4RScUWD7hq7W2e0W0
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2