General
-
Target
msdcsc.exe_pw_infected.zip
-
Size
350KB
-
Sample
250413-ab22patzcv
-
MD5
7e62dc3f267de17a09f388342aafddcd
-
SHA1
928d72b5e52b56a44d18f160efb0119b8d6f9f76
-
SHA256
7b81f22a76c83b176e760f6957f6e86019660656ea94a73f880b4085bcfc7957
-
SHA512
62599139ad38b71db7dbde330270e8b9328e1e9166cd10a998e170e684a866ba06c67bab538ae46414b348bcdf4acd7b8135e2e265599b89c0ce8dca6fab462d
-
SSDEEP
6144:htEchjN1JPhpSXXpVf5MO0/wFPpT3YqGJ0SewGft0hetuhX7FlZLa66p2BtR5ZOC:PtxAVf5GwBV3CJLewG10hOM7ZW6/2w+M
Behavioral task
behavioral1
Sample
msdcsc.exe_pw_infected.zip
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
0x0007000000019273-20.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-7X99PTF
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
DNgeskLTppzX
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
System32.dll
Targets
-
-
Target
msdcsc.exe_pw_infected.zip
-
Size
350KB
-
MD5
7e62dc3f267de17a09f388342aafddcd
-
SHA1
928d72b5e52b56a44d18f160efb0119b8d6f9f76
-
SHA256
7b81f22a76c83b176e760f6957f6e86019660656ea94a73f880b4085bcfc7957
-
SHA512
62599139ad38b71db7dbde330270e8b9328e1e9166cd10a998e170e684a866ba06c67bab538ae46414b348bcdf4acd7b8135e2e265599b89c0ce8dca6fab462d
-
SSDEEP
6144:htEchjN1JPhpSXXpVf5MO0/wFPpT3YqGJ0SewGft0hetuhX7FlZLa66p2BtR5ZOC:PtxAVf5GwBV3CJLewG10hOM7ZW6/2w+M
Score1/10 -
-
-
Target
0x0007000000019273-20
-
Size
658KB
-
MD5
3178fcad2d2c2f3c0f4f70aecfb18db7
-
SHA1
0ecad6522214f9bef4dd8f2f8eb927827bc4971c
-
SHA256
dd8650f0e484ba0ea4775ccce3a9644bba747ee92f1b534628525c7ceedc69f9
-
SHA512
57148c860850344b1086c8765c083862d57d99119914e218aca4c8e80dc9cbe48d206b6aefaea9ad5cda58a459ff5888f1bc82f6fabacd2aa81f52818cef4985
-
SSDEEP
12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hV:KZ1xuVVjfFoynPaVBUR8f+kN10EBP
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2