General
-
Target
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe
-
Size
546KB
-
Sample
250216-zme4qsykbj
-
MD5
bd64270ddd4665196a13698621e445ea
-
SHA1
c7321df1931694529559cd4b358a221e27b6034f
-
SHA256
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df
-
SHA512
f00a0e6fbe4733a5346d6cf2e1e6a3c3ffd3ef3e9fd3fc0e1a382c16bb88d199d2d71c9a39b915cc0057f434d0eb77cc21492bb35e1e9ed31d280ac89343ad9c
-
SSDEEP
6144:+TbDkbqcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37kGbrKhYcR7tjAeCXTTzm:EbYecW7KEZlPzCy37kGnKhV5qJXTnk1H
Static task
static1
Behavioral task
behavioral1
Sample
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
darkcomet
Y.S.M
microsft.redirectme.net:1603
DC_MUTEX-UF59SW5
-
InstallPath
MSDCSC\NvidiaaStrreamer.exe
-
gencode
CSknSw2UGJAw
-
install
true
-
offline_keylogger
true
-
password
01061660256
-
persistence
true
-
reg_key
nvdiaxnd
Targets
-
-
Target
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe
-
Size
546KB
-
MD5
bd64270ddd4665196a13698621e445ea
-
SHA1
c7321df1931694529559cd4b358a221e27b6034f
-
SHA256
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df
-
SHA512
f00a0e6fbe4733a5346d6cf2e1e6a3c3ffd3ef3e9fd3fc0e1a382c16bb88d199d2d71c9a39b915cc0057f434d0eb77cc21492bb35e1e9ed31d280ac89343ad9c
-
SSDEEP
6144:+TbDkbqcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37kGbrKhYcR7tjAeCXTTzm:EbYecW7KEZlPzCy37kGnKhV5qJXTnk1H
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6