General
-
Target
afde80e403c3cee66901608a34694fed406fe49bf29f7a094b5849490066d1e2
-
Size
6.2MB
-
Sample
210515-s8cc9c6hpa
-
MD5
4dbce725957c4224d8eda6f98319e048
-
SHA1
918762b4e789416e62bb9a2947f66d8f03325474
-
SHA256
afde80e403c3cee66901608a34694fed406fe49bf29f7a094b5849490066d1e2
-
SHA512
3e8f4c959bce90c6dfa08da98454ba0c58fad680b784ae3c2ade977e15cedc65a133f4e929cb82e6651830a9f1d4f27a41fd994cbef1201db1d04bb84c78d0b9
Static task
static1
Behavioral task
behavioral1
Sample
afde80e403c3cee66901608a34694fed406fe49bf29f7a094b5849490066d1e2.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
afde80e403c3cee66901608a34694fed406fe49bf29f7a094b5849490066d1e2.exe
Resource
win10v20210410
Malware Config
Extracted
darkcomet
Hackeado EDK
kaelhacking.no-ip.org:2000
DC_MUTEX-TCSRCNU
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
YREZtoVwzYzE
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
afde80e403c3cee66901608a34694fed406fe49bf29f7a094b5849490066d1e2
-
Size
6.2MB
-
MD5
4dbce725957c4224d8eda6f98319e048
-
SHA1
918762b4e789416e62bb9a2947f66d8f03325474
-
SHA256
afde80e403c3cee66901608a34694fed406fe49bf29f7a094b5849490066d1e2
-
SHA512
3e8f4c959bce90c6dfa08da98454ba0c58fad680b784ae3c2ade977e15cedc65a133f4e929cb82e6651830a9f1d4f27a41fd994cbef1201db1d04bb84c78d0b9
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-