General
-
Target
501b06bbbdfc13d8f7ab54a5e43e41845df54c2977d658812d0eb490b6479dc6
-
Size
283KB
-
Sample
220520-wfq1waebdl
-
MD5
a41eb80d74c75775d8ab172cdb96021a
-
SHA1
b941643497f1e9f077403da572192bea7544ef67
-
SHA256
501b06bbbdfc13d8f7ab54a5e43e41845df54c2977d658812d0eb490b6479dc6
-
SHA512
eea16e51b0abc8a93dc9e4d9339dd860529a48d902458752e8b19e98566ca325669db9dab1d8a35d8b9473b633138591da57de3a66bf38efc637c0064ca0070f
Static task
static1
Behavioral task
behavioral1
Sample
501b06bbbdfc13d8f7ab54a5e43e41845df54c2977d658812d0eb490b6479dc6.exe
Resource
win7-20220414-en
Malware Config
Extracted
darkcomet
jdominwars
ovosh9999.ddns.net:1604
DC_MUTEX-XZYDV4B
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
3aNjt0rawfS4
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
501b06bbbdfc13d8f7ab54a5e43e41845df54c2977d658812d0eb490b6479dc6
-
Size
283KB
-
MD5
a41eb80d74c75775d8ab172cdb96021a
-
SHA1
b941643497f1e9f077403da572192bea7544ef67
-
SHA256
501b06bbbdfc13d8f7ab54a5e43e41845df54c2977d658812d0eb490b6479dc6
-
SHA512
eea16e51b0abc8a93dc9e4d9339dd860529a48d902458752e8b19e98566ca325669db9dab1d8a35d8b9473b633138591da57de3a66bf38efc637c0064ca0070f
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-