General
-
Target
ce7cfc1461bfed84d592ecce5a97019032c20c23c75fe2cf923772143b7dbc50.exe
-
Size
306KB
-
Sample
250323-pecnjatlw6
-
MD5
e1d8cb76cd0f3542094d22d31ed0a745
-
SHA1
6e69107c2a66f5ba99e5afcefcc76ffb74cb75fc
-
SHA256
ce7cfc1461bfed84d592ecce5a97019032c20c23c75fe2cf923772143b7dbc50
-
SHA512
710740a7a38a5ce555844d21be452c817919894a291c012eecc1ed425867a7ab299e4049cedbfc9eb1a48de8c16a7b734d167582f149ec2bafb01fc5176b1524
-
SSDEEP
6144:uuQDRdq7Ww4MthMtPckBP6T08z/zxWPxZuuOyU:uu2Rw7WwREzolWZZuvh
Static task
static1
Behavioral task
behavioral1
Sample
ce7cfc1461bfed84d592ecce5a97019032c20c23c75fe2cf923772143b7dbc50.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ce7cfc1461bfed84d592ecce5a97019032c20c23c75fe2cf923772143b7dbc50.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
darkcomet
FarCry
octopus01.airdns.org:2404
octopus01.ddns.net:2404
DC_MUTEX-YGBUNDC
-
InstallPath
Ubisoft\FarCry\FCupdate.exe
-
gencode
jv2Y4dfih9vp
-
install
true
-
offline_keylogger
true
-
password
V10tt0PC
-
persistence
true
-
reg_key
FCUpdate
Targets
-
-
Target
ce7cfc1461bfed84d592ecce5a97019032c20c23c75fe2cf923772143b7dbc50.exe
-
Size
306KB
-
MD5
e1d8cb76cd0f3542094d22d31ed0a745
-
SHA1
6e69107c2a66f5ba99e5afcefcc76ffb74cb75fc
-
SHA256
ce7cfc1461bfed84d592ecce5a97019032c20c23c75fe2cf923772143b7dbc50
-
SHA512
710740a7a38a5ce555844d21be452c817919894a291c012eecc1ed425867a7ab299e4049cedbfc9eb1a48de8c16a7b734d167582f149ec2bafb01fc5176b1524
-
SSDEEP
6144:uuQDRdq7Ww4MthMtPckBP6T08z/zxWPxZuuOyU:uu2Rw7WwREzolWZZuvh
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Virtualization/Sandbox Evasion
1