General
-
Target
996beea9299ded8bca31425c26e3cc07930852c4a0b73ca362ff9e2200d651acN.exe
-
Size
658KB
-
Sample
241216-mp9pxaxqgq
-
MD5
7e32a97cd6071306602c84c223bee650
-
SHA1
3d8533bf5fdbd5830382d3e331215d70c7798946
-
SHA256
996beea9299ded8bca31425c26e3cc07930852c4a0b73ca362ff9e2200d651ac
-
SHA512
01871935591a371394e2b394b2638aac51bf6248200aa97c28dcc04b22ac6d107b1f097a6a6412b3b7b21bce29b1c62a839c481bf94e0f9732178e683afc40a7
-
SSDEEP
12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hI:KZ1xuVVjfFoynPaVBUR8f+kN10EB6
Behavioral task
behavioral1
Sample
996beea9299ded8bca31425c26e3cc07930852c4a0b73ca362ff9e2200d651acN.exe
Resource
win7-20241023-en
Malware Config
Extracted
darkcomet
Guest1
adobens.hopto.org:1604
DC_MUTEX-GDVHDWW
-
InstallPath
MSDCS\msdcs12.exe
-
gencode
HAlbHiVRqz20
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
msdcsa
Targets
-
-
Target
996beea9299ded8bca31425c26e3cc07930852c4a0b73ca362ff9e2200d651acN.exe
-
Size
658KB
-
MD5
7e32a97cd6071306602c84c223bee650
-
SHA1
3d8533bf5fdbd5830382d3e331215d70c7798946
-
SHA256
996beea9299ded8bca31425c26e3cc07930852c4a0b73ca362ff9e2200d651ac
-
SHA512
01871935591a371394e2b394b2638aac51bf6248200aa97c28dcc04b22ac6d107b1f097a6a6412b3b7b21bce29b1c62a839c481bf94e0f9732178e683afc40a7
-
SSDEEP
12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hI:KZ1xuVVjfFoynPaVBUR8f+kN10EB6
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2