General
-
Target
26059f0fd0aeb86a4e7a7958b39f60f6c9c23b6d276be4bf2eac3401357cec60
-
Size
658KB
-
Sample
221002-snkmaadfar
-
MD5
464acee7516d9778c5796cd207763130
-
SHA1
1e4adb87d13df8b2384d6f69660c10d30046ba3f
-
SHA256
26059f0fd0aeb86a4e7a7958b39f60f6c9c23b6d276be4bf2eac3401357cec60
-
SHA512
20c5286108174244b03201f645c40142bc822731c0e72e0cae09b4bde78eeaba07341122b56be79a95ebec54edfd2d0d74c4c161b53d2baa698783b9bc7f8fa7
-
SSDEEP
12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hC:KZ1xuVVjfFoynPaVBUR8f+kN10EBA
Behavioral task
behavioral1
Sample
26059f0fd0aeb86a4e7a7958b39f60f6c9c23b6d276be4bf2eac3401357cec60.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
fud
rstown123.no-ip.biz:1604
DC_MUTEX-JP6320Y
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ZNo47uL39Z9o
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
26059f0fd0aeb86a4e7a7958b39f60f6c9c23b6d276be4bf2eac3401357cec60
-
Size
658KB
-
MD5
464acee7516d9778c5796cd207763130
-
SHA1
1e4adb87d13df8b2384d6f69660c10d30046ba3f
-
SHA256
26059f0fd0aeb86a4e7a7958b39f60f6c9c23b6d276be4bf2eac3401357cec60
-
SHA512
20c5286108174244b03201f645c40142bc822731c0e72e0cae09b4bde78eeaba07341122b56be79a95ebec54edfd2d0d74c4c161b53d2baa698783b9bc7f8fa7
-
SSDEEP
12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hC:KZ1xuVVjfFoynPaVBUR8f+kN10EBA
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-