General
-
Target
6c592736cf6ae24c1d7e5d051234fdbd
-
Size
1.1MB
-
Sample
210719-n5t5cs4fcs
-
MD5
6c592736cf6ae24c1d7e5d051234fdbd
-
SHA1
dcfddb9aed55a79e38287ddd4e849728d61b67c7
-
SHA256
846d82f6f9d6b965ef683cd91724d72917263cf21e9f0f7e4ed2cb4f1ceacce8
-
SHA512
e5d7692eec1fbdf05c87164951d93a911c0c2308e700d5b7543852c98d31fddfc2c2ed043a514def3a1d9e5fe7317b3771f148dad2c900a3e58e3454e1e6fad1
Static task
static1
Behavioral task
behavioral1
Sample
6c592736cf6ae24c1d7e5d051234fdbd.exe
Resource
win7v20210410
Malware Config
Extracted
darkcomet
GG
secret92.ddns.net:82
DC_MUTEX-A6ET8RQ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
oqyLUmi211Cb
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
njrat
0.7NC
NYAN CAT
secret92.ddns.net:8082
0c3398f1458
-
reg_key
0c3398f1458
-
splitter
@!#&^%$
Targets
-
-
Target
6c592736cf6ae24c1d7e5d051234fdbd
-
Size
1.1MB
-
MD5
6c592736cf6ae24c1d7e5d051234fdbd
-
SHA1
dcfddb9aed55a79e38287ddd4e849728d61b67c7
-
SHA256
846d82f6f9d6b965ef683cd91724d72917263cf21e9f0f7e4ed2cb4f1ceacce8
-
SHA512
e5d7692eec1fbdf05c87164951d93a911c0c2308e700d5b7543852c98d31fddfc2c2ed043a514def3a1d9e5fe7317b3771f148dad2c900a3e58e3454e1e6fad1
-
Modifies WinLogon for persistence
-
Modifies security service
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-