General
-
Target
7639776db988583b407620c0fbdeb6b320876e9eca997ccb0f2bc2a379b0f035.exe
-
Size
756KB
-
Sample
250212-qmmddaspfl
-
MD5
29e0da04e8aa29efc9a91358cffbafc7
-
SHA1
16590f4e92c1cfef08237f08b48cdccb2c7e4cfc
-
SHA256
7639776db988583b407620c0fbdeb6b320876e9eca997ccb0f2bc2a379b0f035
-
SHA512
77b9bd299093671ed967c01fc5dbe3e89b484c4c75fdb3294b96f8e5aca17be5145010e04fd5112bf056e6c273bba13f07c1269898b66cf520bea34dfcecc870
-
SSDEEP
12288:K9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/ht:GZ1xuVVjfFoynPaVBUR8f+kN10EBv
Behavioral task
behavioral1
Sample
7639776db988583b407620c0fbdeb6b320876e9eca997ccb0f2bc2a379b0f035.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7639776db988583b407620c0fbdeb6b320876e9eca997ccb0f2bc2a379b0f035.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
darkcomet
Mucix
heybeybidonunneydi.no-ip.org:15963
civcivessek.no-ip.org:15963
DC_MUTEX-Y88TJ9D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Fs9Wry9kctNE
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
7639776db988583b407620c0fbdeb6b320876e9eca997ccb0f2bc2a379b0f035.exe
-
Size
756KB
-
MD5
29e0da04e8aa29efc9a91358cffbafc7
-
SHA1
16590f4e92c1cfef08237f08b48cdccb2c7e4cfc
-
SHA256
7639776db988583b407620c0fbdeb6b320876e9eca997ccb0f2bc2a379b0f035
-
SHA512
77b9bd299093671ed967c01fc5dbe3e89b484c4c75fdb3294b96f8e5aca17be5145010e04fd5112bf056e6c273bba13f07c1269898b66cf520bea34dfcecc870
-
SSDEEP
12288:K9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/ht:GZ1xuVVjfFoynPaVBUR8f+kN10EBv
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6