General
-
Target
bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059
-
Size
340KB
-
Sample
221002-1tvnfadhdk
-
MD5
651a7cc3a3b7d279929b20b7b3d6affd
-
SHA1
db6607d408be3e1d25076725b1af8f048a79fc7a
-
SHA256
bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059
-
SHA512
df0e96ad98c7b5694907902c338f3d173806e6e1a41bbc0e3c1e5e387df1a67011f8d1f507ab52c87633f21ba7d7b466f80dfdd8b370cb07ec2729646667d83a
-
SSDEEP
6144:TFhS9QH4pMojgpGGv1f93w9ost7jrWdl77dgJ7VHg4FTqjxeNBZqGB:vS9QH+Mo0GuK9ostDWdl75gHHrqABZqm
Static task
static1
Behavioral task
behavioral1
Sample
bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
mentyy.zapto.org:81
DC_MUTEX-RDAMRJ4
-
InstallPath
4a5hf489643fs3ar3f\lib_kt000201204upd.exe
-
gencode
VWTn8UD7C2ZP
-
install
true
-
offline_keylogger
true
-
password
1234
-
persistence
true
-
reg_key
winupd
Targets
-
-
Target
bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059
-
Size
340KB
-
MD5
651a7cc3a3b7d279929b20b7b3d6affd
-
SHA1
db6607d408be3e1d25076725b1af8f048a79fc7a
-
SHA256
bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059
-
SHA512
df0e96ad98c7b5694907902c338f3d173806e6e1a41bbc0e3c1e5e387df1a67011f8d1f507ab52c87633f21ba7d7b466f80dfdd8b370cb07ec2729646667d83a
-
SSDEEP
6144:TFhS9QH4pMojgpGGv1f93w9ost7jrWdl77dgJ7VHg4FTqjxeNBZqGB:vS9QH+Mo0GuK9ostDWdl75gHHrqABZqm
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-