General
-
Target
ec118b8293d0b1683a004d4156eca929f4651771a8ed3197063107e770d35462.exe
-
Size
1.3MB
-
Sample
250109-cqyzpatnb1
-
MD5
2551f955c536e60dc4928e243ab2136d
-
SHA1
ac9602b5f24a097b20fcfdc1e41c6656ab6e5ede
-
SHA256
ec118b8293d0b1683a004d4156eca929f4651771a8ed3197063107e770d35462
-
SHA512
b892be40eab009bf22cd92f1b93bb9bbb954585d2e0ebe2cd1001f7bcc80e65e2f0c0f974d1abe23885c0a1b38d8b37f079e21ad64d5ca1dada230e0222e09e1
-
SSDEEP
24576:URmJkcoQricOIQxiZY1ianbPG48TIHm0X8zizW1EIpVP13WDc6ma:xJZoQrbTFZY1ianh8T90XFILoDcxa
Static task
static1
Behavioral task
behavioral1
Sample
ec118b8293d0b1683a004d4156eca929f4651771a8ed3197063107e770d35462.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
spoof
spoofdns.no-ip.org:1604
DCMIN_MUTEX-0R4X7F9
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
q312Ub2N15X4
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
ec118b8293d0b1683a004d4156eca929f4651771a8ed3197063107e770d35462.exe
-
Size
1.3MB
-
MD5
2551f955c536e60dc4928e243ab2136d
-
SHA1
ac9602b5f24a097b20fcfdc1e41c6656ab6e5ede
-
SHA256
ec118b8293d0b1683a004d4156eca929f4651771a8ed3197063107e770d35462
-
SHA512
b892be40eab009bf22cd92f1b93bb9bbb954585d2e0ebe2cd1001f7bcc80e65e2f0c0f974d1abe23885c0a1b38d8b37f079e21ad64d5ca1dada230e0222e09e1
-
SSDEEP
24576:URmJkcoQricOIQxiZY1ianbPG48TIHm0X8zizW1EIpVP13WDc6ma:xJZoQrbTFZY1ianh8T90XFILoDcxa
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1