General
-
Target
f816377ac402ed2774e8d5e69e9fec2e7e02a95f820ca6ea00819fc47d91d691.exe
-
Size
1.6MB
-
Sample
250216-sjj5ys1kak
-
MD5
0cb3cab82171b9ed0301c31deedb2976
-
SHA1
e75ff793aca1d65b944e7823c8fec0d464795d59
-
SHA256
f816377ac402ed2774e8d5e69e9fec2e7e02a95f820ca6ea00819fc47d91d691
-
SHA512
579bb9ed177faef02430df1aed97f2761278c8a894a5930fa9c0c8afb0017fa91e2c92eba79cb1a03c6352f425a50088e73dd13976b9cd9158174bf4676f90b0
-
SSDEEP
49152:opLAZG/fLlSMp4OqW8xX8/bc7svZkq08Y9sTOx:ClSMGOqjM/bcAxkq08Y9sG
Static task
static1
Behavioral task
behavioral1
Sample
f816377ac402ed2774e8d5e69e9fec2e7e02a95f820ca6ea00819fc47d91d691.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Bunker 2
fingers.no-ip.biz:4421
DCMIN_MUTEX-0DWPKLM
-
gencode
wKcjsm51vLbU
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
f816377ac402ed2774e8d5e69e9fec2e7e02a95f820ca6ea00819fc47d91d691.exe
-
Size
1.6MB
-
MD5
0cb3cab82171b9ed0301c31deedb2976
-
SHA1
e75ff793aca1d65b944e7823c8fec0d464795d59
-
SHA256
f816377ac402ed2774e8d5e69e9fec2e7e02a95f820ca6ea00819fc47d91d691
-
SHA512
579bb9ed177faef02430df1aed97f2761278c8a894a5930fa9c0c8afb0017fa91e2c92eba79cb1a03c6352f425a50088e73dd13976b9cd9158174bf4676f90b0
-
SSDEEP
49152:opLAZG/fLlSMp4OqW8xX8/bc7svZkq08Y9sTOx:ClSMGOqjM/bcAxkq08Y9sG
-
Darkcomet family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1