General
-
Target
494f1f9db5268247533e28b2a3785de4bea7cd123e050d97700964943922a6db
-
Size
658KB
-
Sample
220714-ag8resgbf9
-
MD5
d3589c94215ab602474b5d6b6e7a6380
-
SHA1
49c2134fb14c2546771933b1ddfc53dd0561aa00
-
SHA256
494f1f9db5268247533e28b2a3785de4bea7cd123e050d97700964943922a6db
-
SHA512
e2625c5dcd3f44528baf998acf1b6867e6dbaba94679cb6e5faa6b024552f17b2d62442ba04eef57e32f1706572e1ddcdd60748ebd9169b85b8062b6d5641bfa
Behavioral task
behavioral1
Sample
494f1f9db5268247533e28b2a3785de4bea7cd123e050d97700964943922a6db.exe
Resource
win7-20220414-en
Malware Config
Extracted
darkcomet
Guest16
8.tcp.ngrok.io:13657
DC_MUTEX-G3PH8LT
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
wAgcpnDzigN6
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
494f1f9db5268247533e28b2a3785de4bea7cd123e050d97700964943922a6db
-
Size
658KB
-
MD5
d3589c94215ab602474b5d6b6e7a6380
-
SHA1
49c2134fb14c2546771933b1ddfc53dd0561aa00
-
SHA256
494f1f9db5268247533e28b2a3785de4bea7cd123e050d97700964943922a6db
-
SHA512
e2625c5dcd3f44528baf998acf1b6867e6dbaba94679cb6e5faa6b024552f17b2d62442ba04eef57e32f1706572e1ddcdd60748ebd9169b85b8062b6d5641bfa
-
Modifies WinLogon for persistence
-
Modifies security service
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-