General
-
Target
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5
-
Size
658KB
-
Sample
210515-1zpwgh39c6
-
MD5
f979bb14551c7b5166c2564f0cb81b17
-
SHA1
8ee1be6c76d7a2a1179564bd0e12bb94a603402c
-
SHA256
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5
-
SHA512
232f74ea88561f67e5a3095b83681e4f35e49e5c877e81c23cf9b04994a299e8fd981e2efae97297e6f4226ad7d7f49bd2ee4eb4d0d9a4162f22dd2749e8af23
Behavioral task
behavioral1
Sample
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5.exe
Resource
win7v20210410
Malware Config
Extracted
darkcomet
All
192.168.0.102:1604
192.168.0.102:81
DC_MUTEX-GRA2N0X
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
jqHg0YaebT2u
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5
-
Size
658KB
-
MD5
f979bb14551c7b5166c2564f0cb81b17
-
SHA1
8ee1be6c76d7a2a1179564bd0e12bb94a603402c
-
SHA256
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5
-
SHA512
232f74ea88561f67e5a3095b83681e4f35e49e5c877e81c23cf9b04994a299e8fd981e2efae97297e6f4226ad7d7f49bd2ee4eb4d0d9a4162f22dd2749e8af23
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-