General
-
Target
45cf8c779808395dc912f672906c7238ba29d6378ffbd9473e7d903969357a27
-
Size
1.0MB
-
Sample
220707-mtrd5afff7
-
MD5
21628e8eba8eb7180cd6c34f6a5ad58b
-
SHA1
77d9b1cb8ee1e85741bfa9c55b5b148113889d4c
-
SHA256
45cf8c779808395dc912f672906c7238ba29d6378ffbd9473e7d903969357a27
-
SHA512
e3dd0f9135f82ed42db2c5f73dd808b96c51d6d6f281b3b50a26561a3d560ecd2bae941a9472e4dba454873c70b07e2b0574f989ad0b3a3ab1ee422cd4fad351
Static task
static1
Behavioral task
behavioral1
Sample
45cf8c779808395dc912f672906c7238ba29d6378ffbd9473e7d903969357a27.exe
Resource
win7-20220414-en
Malware Config
Extracted
darkcomet
Machines
yoongconie.ddns.net:2216
DC_MUTEX-CCRTDV7
-
gencode
zX5yKAb1uzFM
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
45cf8c779808395dc912f672906c7238ba29d6378ffbd9473e7d903969357a27
-
Size
1.0MB
-
MD5
21628e8eba8eb7180cd6c34f6a5ad58b
-
SHA1
77d9b1cb8ee1e85741bfa9c55b5b148113889d4c
-
SHA256
45cf8c779808395dc912f672906c7238ba29d6378ffbd9473e7d903969357a27
-
SHA512
e3dd0f9135f82ed42db2c5f73dd808b96c51d6d6f281b3b50a26561a3d560ecd2bae941a9472e4dba454873c70b07e2b0574f989ad0b3a3ab1ee422cd4fad351
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-