General
-
Target
5f987f2a7b816e370f98409bdbf18ee154ea46eb948ce833a9d95c034f764134
-
Size
658KB
-
Sample
221011-k9jccafga8
-
MD5
62e6fcd615d7fbec03f18a4dfb959d40
-
SHA1
fca59c3c98c755049114b59886d0bcc10eb423e9
-
SHA256
5f987f2a7b816e370f98409bdbf18ee154ea46eb948ce833a9d95c034f764134
-
SHA512
ca5db873de4736de34f612c6840f1b0432bc12099ebea80c92fca884aed96246455b65e836cb5219d66c44f6ac2a211fa6984e2e48af953258226980b81cbc12
-
SSDEEP
12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hp:eZ1xuVVjfFoynPaVBUR8f+kN10EBX
Behavioral task
behavioral1
Sample
5f987f2a7b816e370f98409bdbf18ee154ea46eb948ce833a9d95c034f764134.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5f987f2a7b816e370f98409bdbf18ee154ea46eb948ce833a9d95c034f764134.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
Guest16
psych0s1s.no-ip.biz:1604
DC_MUTEX-L39NMJA
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
SV7NDmjzb4il
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
rundll32
Targets
-
-
Target
5f987f2a7b816e370f98409bdbf18ee154ea46eb948ce833a9d95c034f764134
-
Size
658KB
-
MD5
62e6fcd615d7fbec03f18a4dfb959d40
-
SHA1
fca59c3c98c755049114b59886d0bcc10eb423e9
-
SHA256
5f987f2a7b816e370f98409bdbf18ee154ea46eb948ce833a9d95c034f764134
-
SHA512
ca5db873de4736de34f612c6840f1b0432bc12099ebea80c92fca884aed96246455b65e836cb5219d66c44f6ac2a211fa6984e2e48af953258226980b81cbc12
-
SSDEEP
12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hp:eZ1xuVVjfFoynPaVBUR8f+kN10EBX
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-