General
-
Target
a
-
Size
1.5MB
-
Sample
220225-dnmz3sffbn
-
MD5
7264b8eb7076a2b78617e0e38058d0f3
-
SHA1
03cd675e664f434773d9c069c0a59b428cd1bedc
-
SHA256
728418b13e48aacdb925ae8b891e0f0a35ec8482c92f65fefe8bd4ab890224d2
-
SHA512
47f1d0fef411ab7fcc587b1fad1b143c69dc0723ff58f7d0d8f9d29efe2bcc8ca016b6536996a2a3bc7af2b49a378c68d03876962d5a84eea01c0f119a0643e1
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
darkcomet
Sazan
akordion.duckdns.org:1604
DC_MUTEX-CADHQZA
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
344KSen6NjLL
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
a
-
Size
1.5MB
-
MD5
7264b8eb7076a2b78617e0e38058d0f3
-
SHA1
03cd675e664f434773d9c069c0a59b428cd1bedc
-
SHA256
728418b13e48aacdb925ae8b891e0f0a35ec8482c92f65fefe8bd4ab890224d2
-
SHA512
47f1d0fef411ab7fcc587b1fad1b143c69dc0723ff58f7d0d8f9d29efe2bcc8ca016b6536996a2a3bc7af2b49a378c68d03876962d5a84eea01c0f119a0643e1
-
Modifies WinLogon for persistence
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-