General
-
Target
218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacefN.exe
-
Size
966KB
-
Sample
241219-advemaxqdw
-
MD5
6c3c1088500350d9ff8c0869177ef5f0
-
SHA1
3da4fdd97fe1264bf1da9c14b24abdad3bc741ce
-
SHA256
218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacef
-
SHA512
52425e86bc82802c858a5ae954aeafb47f4f6dafbcf8c5aecc40ce560007de090a02a8ca5a83dfbaca396428f852022d07bed08419183a0a9a62c1d30e5b16dd
-
SSDEEP
12288:N3TD4DnRfwKl+znaNpofSsa9Pi+W9iXqpea3wJWIfBT3PGUE0/DrRrPGVz:FTQuKl+zsUC6J9i+3wJRT3PI0/xGx
Static task
static1
Behavioral task
behavioral1
Sample
218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacefN.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
Guest16
74.65.183.83:1604
74.65.183.83:25565
74.65.183.83:1122
74.65.183.83:100
DC_MUTEX-XH87550
-
InstallPath
WindowsUpdate.exe
-
gencode
MwBxQSYoXbQb
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
WindoesUpdate.dll
Targets
-
-
Target
218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacefN.exe
-
Size
966KB
-
MD5
6c3c1088500350d9ff8c0869177ef5f0
-
SHA1
3da4fdd97fe1264bf1da9c14b24abdad3bc741ce
-
SHA256
218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacef
-
SHA512
52425e86bc82802c858a5ae954aeafb47f4f6dafbcf8c5aecc40ce560007de090a02a8ca5a83dfbaca396428f852022d07bed08419183a0a9a62c1d30e5b16dd
-
SSDEEP
12288:N3TD4DnRfwKl+znaNpofSsa9Pi+W9iXqpea3wJWIfBT3PGUE0/DrRrPGVz:FTQuKl+zsUC6J9i+3wJRT3PI0/xGx
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7