General
-
Target
2fe6a7ae63c878bd84d7b829349b309e7c84194ddbb6a779816f5b84cd8ad45d.exe
-
Size
658KB
-
Sample
250214-c639cayrar
-
MD5
c5ff9d96bc7bc00c2e7c3d656598f118
-
SHA1
5875b392f6ab097134a8f85e973baecd09439f59
-
SHA256
2fe6a7ae63c878bd84d7b829349b309e7c84194ddbb6a779816f5b84cd8ad45d
-
SHA512
757c6409eefe2d346f9016f53fd3e4b092d947f08dec9eb4861a6f3ef6b6f187bfda9160fb3e87fc2f6912841a426c206a162c72fdfdbca0c2805cd88525ac92
-
SSDEEP
12288:e9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hk:qZ1xuVVjfFoynPaVBUR8f+kN10EBS
Behavioral task
behavioral1
Sample
2fe6a7ae63c878bd84d7b829349b309e7c84194ddbb6a779816f5b84cd8ad45d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2fe6a7ae63c878bd84d7b829349b309e7c84194ddbb6a779816f5b84cd8ad45d.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
darkcomet
AUTRE
voltazur.ddns.net:1604
DC_MUTEX-0F1C40C
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
djHf5i8YgrmK
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
2fe6a7ae63c878bd84d7b829349b309e7c84194ddbb6a779816f5b84cd8ad45d.exe
-
Size
658KB
-
MD5
c5ff9d96bc7bc00c2e7c3d656598f118
-
SHA1
5875b392f6ab097134a8f85e973baecd09439f59
-
SHA256
2fe6a7ae63c878bd84d7b829349b309e7c84194ddbb6a779816f5b84cd8ad45d
-
SHA512
757c6409eefe2d346f9016f53fd3e4b092d947f08dec9eb4861a6f3ef6b6f187bfda9160fb3e87fc2f6912841a426c206a162c72fdfdbca0c2805cd88525ac92
-
SSDEEP
12288:e9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hk:qZ1xuVVjfFoynPaVBUR8f+kN10EBS
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Windows security bypass
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5