General
-
Target
509f38d2f10000544d741eda3414c1184ada46e5d654729de67fdb025e701497.exe
-
Size
725KB
-
Sample
250107-srekfaylem
-
MD5
f74b5af14f62bb35a0fee52dce026c95
-
SHA1
86cebb40fce107ee31313fffe74f477ebaf56cb6
-
SHA256
509f38d2f10000544d741eda3414c1184ada46e5d654729de67fdb025e701497
-
SHA512
bb097e493485d2cafbc4b13496d427545233a5b3747af6ea87b1e33a53047c81db09bce4945f5b4b15f464b97b02b20413e818b147aaca0f7b1fec839e09ca65
-
SSDEEP
12288:P9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hlKM:5Z1xuVVjfFoynPaVBUR8f+kN10EB9
Behavioral task
behavioral1
Sample
509f38d2f10000544d741eda3414c1184ada46e5d654729de67fdb025e701497.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
509f38d2f10000544d741eda3414c1184ada46e5d654729de67fdb025e701497.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
harmfulpoop.no-ip.biz
harmfulpoop.no-ip.biz:200
DC_MUTEX-WDP20P9
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
R88C5JqV9fKM
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
509f38d2f10000544d741eda3414c1184ada46e5d654729de67fdb025e701497.exe
-
Size
725KB
-
MD5
f74b5af14f62bb35a0fee52dce026c95
-
SHA1
86cebb40fce107ee31313fffe74f477ebaf56cb6
-
SHA256
509f38d2f10000544d741eda3414c1184ada46e5d654729de67fdb025e701497
-
SHA512
bb097e493485d2cafbc4b13496d427545233a5b3747af6ea87b1e33a53047c81db09bce4945f5b4b15f464b97b02b20413e818b147aaca0f7b1fec839e09ca65
-
SSDEEP
12288:P9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hlKM:5Z1xuVVjfFoynPaVBUR8f+kN10EB9
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1