General
-
Target
.bat
-
Size
658KB
-
Sample
250413-jazpls1ycw
-
MD5
f3aa40d99430ccb842392a6aac95a1b6
-
SHA1
9db9c6b9f0c790f783d359164b31f113ea79e3dc
-
SHA256
59e8f27e60ae878c8bc61b59f6a21a547c6d4c27afb47fa614efbe8e116513b3
-
SHA512
1d0c9f4c9badad6891b4cf8cf0d0cafbe14c39ffb837dac28da338bf7a111524fd5afb1a0f78e8d7b674798ff38d3e840b60b973e6adc16a5e33038fbc614a14
-
SSDEEP
12288:S9HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyFa:+iBIGkbxqEcjsWiDxguehC2Sd
Malware Config
Extracted
darkcomet
Guest16
sound-educated.gl.at.ply.gg:33346
sound-educated.gl.at.ply.gg:1488
DC_MUTEX-J79EFKJ
-
InstallPath
cssr.exe
-
gencode
J5v3kYZkYi5Y
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
.bat
-
Size
658KB
-
MD5
f3aa40d99430ccb842392a6aac95a1b6
-
SHA1
9db9c6b9f0c790f783d359164b31f113ea79e3dc
-
SHA256
59e8f27e60ae878c8bc61b59f6a21a547c6d4c27afb47fa614efbe8e116513b3
-
SHA512
1d0c9f4c9badad6891b4cf8cf0d0cafbe14c39ffb837dac28da338bf7a111524fd5afb1a0f78e8d7b674798ff38d3e840b60b973e6adc16a5e33038fbc614a14
-
SSDEEP
12288:S9HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyFa:+iBIGkbxqEcjsWiDxguehC2Sd
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1