General
-
Target
141b05d0d385bf28f19c8cb147a8232bef096ee5a24082c022f0e2efe1387d03
-
Size
1.2MB
-
Sample
250325-zenqxawkv4
-
MD5
0df35e9bc20c616eaf0ec1cbf035f1e5
-
SHA1
fe5e7ec788f03838289528ccc96f42ee5aaf8e6f
-
SHA256
141b05d0d385bf28f19c8cb147a8232bef096ee5a24082c022f0e2efe1387d03
-
SHA512
9b14f02072d7fde33cf4e00cf3289a1adfbb42c3707ce9a30b4149e97aaa9c7a37bc9e2dde365452481c54039efc9fe2eccf6d79217f62b4205d48bd428336d7
-
SSDEEP
24576:gvEYVxNoHgkXeLyr6VuPJNNr/K/cRgOnmq9g62pFSSL:gv9NagroLrscOU7m6QF/
Static task
static1
Behavioral task
behavioral1
Sample
141b05d0d385bf28f19c8cb147a8232bef096ee5a24082c022f0e2efe1387d03.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
HAHA
127.0.0.1:888
217.66.231.239:888
DC_MUTEX-F54S21D
-
InstallPath
MOKSC\youtube.exe
-
gencode
EAYaaW4sHghc
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Micmdjedate
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
141b05d0d385bf28f19c8cb147a8232bef096ee5a24082c022f0e2efe1387d03
-
Size
1.2MB
-
MD5
0df35e9bc20c616eaf0ec1cbf035f1e5
-
SHA1
fe5e7ec788f03838289528ccc96f42ee5aaf8e6f
-
SHA256
141b05d0d385bf28f19c8cb147a8232bef096ee5a24082c022f0e2efe1387d03
-
SHA512
9b14f02072d7fde33cf4e00cf3289a1adfbb42c3707ce9a30b4149e97aaa9c7a37bc9e2dde365452481c54039efc9fe2eccf6d79217f62b4205d48bd428336d7
-
SSDEEP
24576:gvEYVxNoHgkXeLyr6VuPJNNr/K/cRgOnmq9g62pFSSL:gv9NagroLrscOU7m6QF/
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1