General
-
Target
1caef78ed7643113a123acb200ee0a4e9b0701f633ed930cbd860a59c8c7804f
-
Size
658KB
-
Sample
221011-k9rnqafgb7
-
MD5
6a80263cd78c4b6e4590b23f5c6af350
-
SHA1
fbd71a427e3d2952ccdcbc0c7fadab71403b57a9
-
SHA256
1caef78ed7643113a123acb200ee0a4e9b0701f633ed930cbd860a59c8c7804f
-
SHA512
d416fb255fa7ef23d090a2817f5d20b4d9937528b84d15eda2005b4c598371bfa8067a4cef05096fbcaa48f08ecd403c2dca9ea8b7fe0e499b02b1ba0aef4263
-
SSDEEP
12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hj:eZ1xuVVjfFoynPaVBUR8f+kN10EBB
Behavioral task
behavioral1
Sample
1caef78ed7643113a123acb200ee0a4e9b0701f633ed930cbd860a59c8c7804f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1caef78ed7643113a123acb200ee0a4e9b0701f633ed930cbd860a59c8c7804f.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
darkcomet
Vic
kanky099.no-ip.biz:1152
DC_MUTEX-XQFCVMS
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
JljsR0RjL48u
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
1caef78ed7643113a123acb200ee0a4e9b0701f633ed930cbd860a59c8c7804f
-
Size
658KB
-
MD5
6a80263cd78c4b6e4590b23f5c6af350
-
SHA1
fbd71a427e3d2952ccdcbc0c7fadab71403b57a9
-
SHA256
1caef78ed7643113a123acb200ee0a4e9b0701f633ed930cbd860a59c8c7804f
-
SHA512
d416fb255fa7ef23d090a2817f5d20b4d9937528b84d15eda2005b4c598371bfa8067a4cef05096fbcaa48f08ecd403c2dca9ea8b7fe0e499b02b1ba0aef4263
-
SSDEEP
12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hj:eZ1xuVVjfFoynPaVBUR8f+kN10EBB
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-