General
-
Target
8ce660126f62daa38399afae4f53c3a69dbad816b6030daae4f43566964595ad
-
Size
253KB
-
Sample
220725-ah8g2sefh2
-
MD5
a1af7a30f3b145b0638608e49b2bb927
-
SHA1
c3ff6ff1b941e39754737e5213f48a14424387f6
-
SHA256
8ce660126f62daa38399afae4f53c3a69dbad816b6030daae4f43566964595ad
-
SHA512
8a62140b69e39c27b91468a324b12b342c4f65bcb405071c024e8ca5c26ddde43093a198365a85001350eec48a7823341da82ab3fa9cf7ab5ebeb58245354e4c
Behavioral task
behavioral1
Sample
8ce660126f62daa38399afae4f53c3a69dbad816b6030daae4f43566964595ad.exe
Resource
win7-20220718-en
Malware Config
Extracted
darkcomet
Guest16
zl5.hopto.org:1604
zl5.hopto.org:27015
DC_MUTEX-0Q5LT4L
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
uVsihbkxVDZL
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
8ce660126f62daa38399afae4f53c3a69dbad816b6030daae4f43566964595ad
-
Size
253KB
-
MD5
a1af7a30f3b145b0638608e49b2bb927
-
SHA1
c3ff6ff1b941e39754737e5213f48a14424387f6
-
SHA256
8ce660126f62daa38399afae4f53c3a69dbad816b6030daae4f43566964595ad
-
SHA512
8a62140b69e39c27b91468a324b12b342c4f65bcb405071c024e8ca5c26ddde43093a198365a85001350eec48a7823341da82ab3fa9cf7ab5ebeb58245354e4c
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-