General
-
Target
47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661
-
Size
283KB
-
Sample
221011-x54hyabcd9
-
MD5
10cfa9d58a011d0cf3f0c1f6fce41b00
-
SHA1
0134dc99f55549b848be2a3e9512d76862bbf70d
-
SHA256
47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661
-
SHA512
d02f7d7150a60ebe1f798c37099778d61f1a04dc6a56feb218f4a6dc87d6029662810a76d918f4075557c4618aa7b16dc81e4e0b015f3c9419d0e3e8f973e830
-
SSDEEP
6144:XcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0P7d:XcWkbgTYWnYnt/IDYhP7d
Behavioral task
behavioral1
Sample
47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661.exe
Resource
win7-20220901-en
Malware Config
Extracted
darkcomet
Guest16
surindan.no-ip.info:1604
DC_MUTEX-VL481JT
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
bmcJuvsPqDff
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661
-
Size
283KB
-
MD5
10cfa9d58a011d0cf3f0c1f6fce41b00
-
SHA1
0134dc99f55549b848be2a3e9512d76862bbf70d
-
SHA256
47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661
-
SHA512
d02f7d7150a60ebe1f798c37099778d61f1a04dc6a56feb218f4a6dc87d6029662810a76d918f4075557c4618aa7b16dc81e4e0b015f3c9419d0e3e8f973e830
-
SSDEEP
6144:XcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0P7d:XcWkbgTYWnYnt/IDYhP7d
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-