General
-
Target
c804d9616b654301e9803b4fb869e4cdbcc55bf1444cbef6aaa0adf4f85f39e6.exe
-
Size
667KB
-
Sample
250216-q27mvszkdv
-
MD5
dfd40fba93e4ad79fcbffb33c9f459f7
-
SHA1
59ec68c8c481d265b23d526e584d332f064c70b5
-
SHA256
c804d9616b654301e9803b4fb869e4cdbcc55bf1444cbef6aaa0adf4f85f39e6
-
SHA512
2f85f0b781f16a07b1d719c293d36ddae45105047f4a345cef5c996dbb51a366c4250c743b5cbf518036791150dcac1ef3f966dcf1fb9a000c1be68dcb6f56e2
-
SSDEEP
12288:6X2JVHMRtDaSm3TJvVNvWV5YTsY7tHwbz/htfcoCoK632zb7G/Qs:Ess2Sm39NNv9wY7tHwbzfIoK6MoX
Behavioral task
behavioral1
Sample
c804d9616b654301e9803b4fb869e4cdbcc55bf1444cbef6aaa0adf4f85f39e6.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
c804d9616b654301e9803b4fb869e4cdbcc55bf1444cbef6aaa0adf4f85f39e6.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
darkcomet
Victimes
foxiland.no-ip.info:1605
DC_MUTEX-JA9LRF4
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
fi9F5LG8zDJG
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
c804d9616b654301e9803b4fb869e4cdbcc55bf1444cbef6aaa0adf4f85f39e6.exe
-
Size
667KB
-
MD5
dfd40fba93e4ad79fcbffb33c9f459f7
-
SHA1
59ec68c8c481d265b23d526e584d332f064c70b5
-
SHA256
c804d9616b654301e9803b4fb869e4cdbcc55bf1444cbef6aaa0adf4f85f39e6
-
SHA512
2f85f0b781f16a07b1d719c293d36ddae45105047f4a345cef5c996dbb51a366c4250c743b5cbf518036791150dcac1ef3f966dcf1fb9a000c1be68dcb6f56e2
-
SSDEEP
12288:6X2JVHMRtDaSm3TJvVNvWV5YTsY7tHwbz/htfcoCoK632zb7G/Qs:Ess2Sm39NNv9wY7tHwbzfIoK6MoX
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6