General
-
Target
db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe
-
Size
818KB
-
Sample
250107-ewwgvswken
-
MD5
3f29936a5969953a1ac7b2575c75ce42
-
SHA1
1012715db3f50f9920e6b087e1c51510240ee4f2
-
SHA256
db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c
-
SHA512
d8020f369d48f10662170c90d0224b12e3500b447e5725e628f0e5e2b4cb480e82c2a281a5b29cde87bf13649f74d1f4d49acd908c7be1078df7bbe7ead8d990
-
SSDEEP
24576:BK4U9Ot+ogFV7gxzq6SOEo9no4DtLIBbl+z2kTh:o4Uw+LF9gJL+om61jh
Static task
static1
Behavioral task
behavioral1
Sample
db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Slave
ghost1997.no-ip.biz:1337
DC_MUTEX-AZZ26SG
-
gencode
v1pe6tD2bNTU
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe
-
Size
818KB
-
MD5
3f29936a5969953a1ac7b2575c75ce42
-
SHA1
1012715db3f50f9920e6b087e1c51510240ee4f2
-
SHA256
db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c
-
SHA512
d8020f369d48f10662170c90d0224b12e3500b447e5725e628f0e5e2b4cb480e82c2a281a5b29cde87bf13649f74d1f4d49acd908c7be1078df7bbe7ead8d990
-
SSDEEP
24576:BK4U9Ot+ogFV7gxzq6SOEo9no4DtLIBbl+z2kTh:o4Uw+LF9gJL+om61jh
-
Darkcomet family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
4