General
-
Target
45ce5e02895d4f1400ec0ff0491f082ced4661582f6b94ab57dcf080f6182472N.exe
-
Size
756KB
-
Sample
250211-mkxjsavjaw
-
MD5
91948be53b10984230d6f3f36dc52ef0
-
SHA1
72c8160abf5ad2f39e0cef2ce2bc9a835243265a
-
SHA256
45ce5e02895d4f1400ec0ff0491f082ced4661582f6b94ab57dcf080f6182472
-
SHA512
5dd7100435381bcfb0562aa1788ed087f2a78607b8671a243f169e7ef6ac03e99b02e07693f5374d94484e4aecc2e5659f25a63f66c578bbea1d151dce35e1f3
-
SSDEEP
12288:K9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hF:GZ1xuVVjfFoynPaVBUR8f+kN10EB3
Behavioral task
behavioral1
Sample
45ce5e02895d4f1400ec0ff0491f082ced4661582f6b94ab57dcf080f6182472N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45ce5e02895d4f1400ec0ff0491f082ced4661582f6b94ab57dcf080f6182472N.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
darkcomet
Mucix
heybeybidonunneydi.no-ip.org:15963
civcivessek.no-ip.org:15963
DC_MUTEX-Y88TJ9D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Fs9Wry9kctNE
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
45ce5e02895d4f1400ec0ff0491f082ced4661582f6b94ab57dcf080f6182472N.exe
-
Size
756KB
-
MD5
91948be53b10984230d6f3f36dc52ef0
-
SHA1
72c8160abf5ad2f39e0cef2ce2bc9a835243265a
-
SHA256
45ce5e02895d4f1400ec0ff0491f082ced4661582f6b94ab57dcf080f6182472
-
SHA512
5dd7100435381bcfb0562aa1788ed087f2a78607b8671a243f169e7ef6ac03e99b02e07693f5374d94484e4aecc2e5659f25a63f66c578bbea1d151dce35e1f3
-
SSDEEP
12288:K9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hF:GZ1xuVVjfFoynPaVBUR8f+kN10EB3
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6