General
-
Target
19e5a79bd2bb228fb166be53607fac6a3b48f7730cc4b0dd01e5f0e2f8485d1c
-
Size
253KB
-
Sample
220725-cplb7sagcj
-
MD5
f4a3645aaaa7b14f4dec9a9f2db0040e
-
SHA1
8430b2a225c8890a354024eb3273e5a21924aac2
-
SHA256
19e5a79bd2bb228fb166be53607fac6a3b48f7730cc4b0dd01e5f0e2f8485d1c
-
SHA512
c14c8aeb6147ad25f5089ff275762f21b066e781c7c2777a055adf11c15549e6dee729e577333d1221b6c61d3731c3824aeb0328650103c6edc77bf9a0cb18f1
Behavioral task
behavioral1
Sample
19e5a79bd2bb228fb166be53607fac6a3b48f7730cc4b0dd01e5f0e2f8485d1c.exe
Resource
win7-20220718-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:888
DC_MUTEX-3Y5WKVN
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ELdwUcYkBbef
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
19e5a79bd2bb228fb166be53607fac6a3b48f7730cc4b0dd01e5f0e2f8485d1c
-
Size
253KB
-
MD5
f4a3645aaaa7b14f4dec9a9f2db0040e
-
SHA1
8430b2a225c8890a354024eb3273e5a21924aac2
-
SHA256
19e5a79bd2bb228fb166be53607fac6a3b48f7730cc4b0dd01e5f0e2f8485d1c
-
SHA512
c14c8aeb6147ad25f5089ff275762f21b066e781c7c2777a055adf11c15549e6dee729e577333d1221b6c61d3731c3824aeb0328650103c6edc77bf9a0cb18f1
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-