General
-
Target
ea0b5518b9786582919612b1f57f93c646791e69a1b0ac9dae23d762d5280663
-
Size
658KB
-
Sample
221011-x5qbbabcc7
-
MD5
13be32acc3d6ae3c866094a3bcd853d3
-
SHA1
83edcb30bb68b3812d26bdcab7759923088cc764
-
SHA256
ea0b5518b9786582919612b1f57f93c646791e69a1b0ac9dae23d762d5280663
-
SHA512
123d2d07fe4124f2f82560f6ba79f3107b76b36e20de5bec384c75b52149470cf16599db12385c0d4a3c85d2f9d1f59446bae2578c2bfb2aa123f281c88d2f4e
-
SSDEEP
12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLd9Ek5C/h3:eZ1xuVVjfFoynPaVBUR8f+kN1PEBt
Behavioral task
behavioral1
Sample
ea0b5518b9786582919612b1f57f93c646791e69a1b0ac9dae23d762d5280663.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea0b5518b9786582919612b1f57f93c646791e69a1b0ac9dae23d762d5280663.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
Guest16_min
anbr.no-ip.biz:1604
DCMIN_MUTEX-GFJEFSF
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
RutLKXvxgcms
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
ea0b5518b9786582919612b1f57f93c646791e69a1b0ac9dae23d762d5280663
-
Size
658KB
-
MD5
13be32acc3d6ae3c866094a3bcd853d3
-
SHA1
83edcb30bb68b3812d26bdcab7759923088cc764
-
SHA256
ea0b5518b9786582919612b1f57f93c646791e69a1b0ac9dae23d762d5280663
-
SHA512
123d2d07fe4124f2f82560f6ba79f3107b76b36e20de5bec384c75b52149470cf16599db12385c0d4a3c85d2f9d1f59446bae2578c2bfb2aa123f281c88d2f4e
-
SSDEEP
12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLd9Ek5C/h3:eZ1xuVVjfFoynPaVBUR8f+kN1PEBt
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-