General
-
Target
5194028adbed199509326ded23b37ee34464892560d2c7c196d0dda8a3bda043.exe
-
Size
698KB
-
Sample
241205-ycbswsvpap
-
MD5
aa75ed1b108fa4129d827209c70a0e65
-
SHA1
730af9657cb90becfe0c9a878f6d307b5bda1655
-
SHA256
5194028adbed199509326ded23b37ee34464892560d2c7c196d0dda8a3bda043
-
SHA512
8aaf0c9e562a6e44f4a0d669575d057a583613260af4bfa7a22aec23632855b87eb505e666415dc520bf2ffb42b96b3f46c6909ae44176156095e83064989a21
-
SSDEEP
12288:uNAuo5DOxkhXzkJcX67+ET69NPA+qfnfaK3yXqkzIl+Me9Mp:uNrkhXzki6ql9mFfn53yXqEIl+4
Static task
static1
Behavioral task
behavioral1
Sample
5194028adbed199509326ded23b37ee34464892560d2c7c196d0dda8a3bda043.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
HF
darkred.servegame.com:4662
DC_MUTEX-7B4EKNW
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
uwJhstfBog81
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
5194028adbed199509326ded23b37ee34464892560d2c7c196d0dda8a3bda043.exe
-
Size
698KB
-
MD5
aa75ed1b108fa4129d827209c70a0e65
-
SHA1
730af9657cb90becfe0c9a878f6d307b5bda1655
-
SHA256
5194028adbed199509326ded23b37ee34464892560d2c7c196d0dda8a3bda043
-
SHA512
8aaf0c9e562a6e44f4a0d669575d057a583613260af4bfa7a22aec23632855b87eb505e666415dc520bf2ffb42b96b3f46c6909ae44176156095e83064989a21
-
SSDEEP
12288:uNAuo5DOxkhXzkJcX67+ET69NPA+qfnfaK3yXqkzIl+Me9Mp:uNrkhXzki6ql9mFfn53yXqEIl+4
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1