General
-
Target
888e63cb4271aa3d7aa434a4ab594cbdca9cc88b5a5bcdcbfd6c0780b41ec615
-
Size
589KB
-
Sample
250226-dt4j1svmw2
-
MD5
8af59e07ee7f2d0891304a4ae4dcdb3d
-
SHA1
8f3d1cf2d30a061d5ed2ab03761e636919488a33
-
SHA256
888e63cb4271aa3d7aa434a4ab594cbdca9cc88b5a5bcdcbfd6c0780b41ec615
-
SHA512
315ec2c041483eb027cfb2fe048f9e860bae0511b105c4488c706976dc87b3ff812488af63cca48410992b97642f668be193be59e51b5c492ffd35a970617b3e
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSm:9fTOIQIu7k5DzvLxm5Bl8sW
Behavioral task
behavioral1
Sample
888e63cb4271aa3d7aa434a4ab594cbdca9cc88b5a5bcdcbfd6c0780b41ec615.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
Botnet
letsgoboom.no-ip.info:1604
DC_MUTEX-JCT2X8G
-
gencode
k*q67FD+Sz0#
-
install
false
-
offline_keylogger
true
-
password
runescaped
-
persistence
false
Targets
-
-
Target
888e63cb4271aa3d7aa434a4ab594cbdca9cc88b5a5bcdcbfd6c0780b41ec615
-
Size
589KB
-
MD5
8af59e07ee7f2d0891304a4ae4dcdb3d
-
SHA1
8f3d1cf2d30a061d5ed2ab03761e636919488a33
-
SHA256
888e63cb4271aa3d7aa434a4ab594cbdca9cc88b5a5bcdcbfd6c0780b41ec615
-
SHA512
315ec2c041483eb027cfb2fe048f9e860bae0511b105c4488c706976dc87b3ff812488af63cca48410992b97642f668be193be59e51b5c492ffd35a970617b3e
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSm:9fTOIQIu7k5DzvLxm5Bl8sW
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-