General
-
Target
00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780
-
Size
600KB
-
Sample
220919-lafylsebgn
-
MD5
744f7afc50e0e4dfa34d013183c315ef
-
SHA1
73ad9e11ab3f2edf861663c7e33b261e6cd3364b
-
SHA256
00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780
-
SHA512
4f41367d25dbd7c85a67dec890df25d0e078b85a302b863911da325f0889d018cf0665ae3bcc8827ce483ea1a51ba271935905cccc2b5d58189f63bb860c504c
-
SSDEEP
12288:n2vt6Pp8TgrMDm5GwvBnx+EUGxWVfWRSlQvKeZBbjcg:n2lJgoDGGwvlx+EUGoShA
Static task
static1
Behavioral task
behavioral1
Sample
00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
PrivateEye
sn0.no-ip.biz:2928
DC_MUTEX-3S9C8EP
-
InstallPath
MSDCSCR\msdcscmain32.exe
-
gencode
te3HHGAMCDaF
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
rundll32
Targets
-
-
Target
00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780
-
Size
600KB
-
MD5
744f7afc50e0e4dfa34d013183c315ef
-
SHA1
73ad9e11ab3f2edf861663c7e33b261e6cd3364b
-
SHA256
00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780
-
SHA512
4f41367d25dbd7c85a67dec890df25d0e078b85a302b863911da325f0889d018cf0665ae3bcc8827ce483ea1a51ba271935905cccc2b5d58189f63bb860c504c
-
SSDEEP
12288:n2vt6Pp8TgrMDm5GwvBnx+EUGxWVfWRSlQvKeZBbjcg:n2lJgoDGGwvlx+EUGoShA
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-