General
-
Target
ccd06265fecc7d7fee73c0e5d84caab25a9d512a66f3c9b00d9f20e592c4ae28N.exe
-
Size
3.8MB
-
Sample
250216-bd91ratqg1
-
MD5
d25d4e2d9d0d4d45ee240fd5dcb86c40
-
SHA1
1a55586db470b8ed71b6e6df0c6b01b8194fefb7
-
SHA256
ccd06265fecc7d7fee73c0e5d84caab25a9d512a66f3c9b00d9f20e592c4ae28
-
SHA512
0a0ac80e60b12884664d40e80600494aeeb73f6c94a9f9037a418934b5270f925c9ac7a4e74efb357134c4f01c6fd4d87fb06a1a4b1752bec33158ff018a529b
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXu:vJwakG4fYrq1HJvpliCQHawbzBbGSlao
Behavioral task
behavioral1
Sample
ccd06265fecc7d7fee73c0e5d84caab25a9d512a66f3c9b00d9f20e592c4ae28N.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Toak
ygo.no-ip.info:1604
DC_MUTEX-ATZCWGJ
-
gencode
.f6X%*nCQSMV
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
ccd06265fecc7d7fee73c0e5d84caab25a9d512a66f3c9b00d9f20e592c4ae28N.exe
-
Size
3.8MB
-
MD5
d25d4e2d9d0d4d45ee240fd5dcb86c40
-
SHA1
1a55586db470b8ed71b6e6df0c6b01b8194fefb7
-
SHA256
ccd06265fecc7d7fee73c0e5d84caab25a9d512a66f3c9b00d9f20e592c4ae28
-
SHA512
0a0ac80e60b12884664d40e80600494aeeb73f6c94a9f9037a418934b5270f925c9ac7a4e74efb357134c4f01c6fd4d87fb06a1a4b1752bec33158ff018a529b
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXu:vJwakG4fYrq1HJvpliCQHawbzBbGSlao
-
Darkcomet family
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1