General
-
Target
7c79bb52c7a2b943472eb32ce2d4ba36b5e5a2fb86c33280fdfe493f88cf8635
-
Size
671KB
-
Sample
221002-3dtgjsfbd2
-
MD5
035f8edd14b80f47b33c1c62d57a8739
-
SHA1
94410dd888341ca45a0ed5641346b8c076458a43
-
SHA256
7c79bb52c7a2b943472eb32ce2d4ba36b5e5a2fb86c33280fdfe493f88cf8635
-
SHA512
6171d54213eae358aafb77b1e1f5d0b80722ef29de7db5a9a0ec5f43009e725e279c85fa3667635be714b618f35d5bf57297327dec8f97c9b3d097c8c2bf5775
-
SSDEEP
12288:zMEbRCkVsqZ+VsJijIYGr3rpBHmLuuhsrXp4jEUSHFma4nENeMS:PvsLsJirwzmqNr54jE3m2Ne1
Static task
static1
Behavioral task
behavioral1
Sample
7c79bb52c7a2b943472eb32ce2d4ba36b5e5a2fb86c33280fdfe493f88cf8635.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c79bb52c7a2b943472eb32ce2d4ba36b5e5a2fb86c33280fdfe493f88cf8635.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
HF
99.230.144.192:1604
DC_MUTEX-X2SBWUK
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
qyD402AeAjJP
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
7c79bb52c7a2b943472eb32ce2d4ba36b5e5a2fb86c33280fdfe493f88cf8635
-
Size
671KB
-
MD5
035f8edd14b80f47b33c1c62d57a8739
-
SHA1
94410dd888341ca45a0ed5641346b8c076458a43
-
SHA256
7c79bb52c7a2b943472eb32ce2d4ba36b5e5a2fb86c33280fdfe493f88cf8635
-
SHA512
6171d54213eae358aafb77b1e1f5d0b80722ef29de7db5a9a0ec5f43009e725e279c85fa3667635be714b618f35d5bf57297327dec8f97c9b3d097c8c2bf5775
-
SSDEEP
12288:zMEbRCkVsqZ+VsJijIYGr3rpBHmLuuhsrXp4jEUSHFma4nENeMS:PvsLsJirwzmqNr54jE3m2Ne1
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-