General
-
Target
a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d
-
Size
1.2MB
-
Sample
221019-1xsy1sadhn
-
MD5
a241280d074124e3fa5d05bb2cba8e6e
-
SHA1
44a4ee61a0f9e647ada2b858942a95b947f05c47
-
SHA256
a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d
-
SHA512
be91faeca248ce4e97cf38461b2960f834c513cfae1f8e77fa2df5d702417c256cf9fb368d26428cec1246373f5f9bbf429eeed2a4e92ebfa0df8ad35fc27a83
-
SSDEEP
12288:wgBvvNVR2ZI0FjCSxOpe3HJaXDngYw89UwmTYjPkgmJFxT6MPUYIAMBQaO9cOCaB:zvzRRwOpXDngYoY8j/UEFcyp0VxPN+r
Static task
static1
Behavioral task
behavioral1
Sample
a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Guest16
192.168.254.104:1604
ford1981.no-ip.org:1604
DC_MUTEX-2V3YSWB
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
aWbR1AewgYg4
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d
-
Size
1.2MB
-
MD5
a241280d074124e3fa5d05bb2cba8e6e
-
SHA1
44a4ee61a0f9e647ada2b858942a95b947f05c47
-
SHA256
a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d
-
SHA512
be91faeca248ce4e97cf38461b2960f834c513cfae1f8e77fa2df5d702417c256cf9fb368d26428cec1246373f5f9bbf429eeed2a4e92ebfa0df8ad35fc27a83
-
SSDEEP
12288:wgBvvNVR2ZI0FjCSxOpe3HJaXDngYw89UwmTYjPkgmJFxT6MPUYIAMBQaO9cOCaB:zvzRRwOpXDngYoY8j/UEFcyp0VxPN+r
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Modifies WinLogon
-
Suspicious use of SetThreadContext
-