General
-
Target
1bbec5e758d94f01b4e1d74e5b7ff2a7ed1a4ee77d06d7ffbdab6a4f73cefae6
-
Size
749KB
-
Sample
221020-1qllcsgbd5
-
MD5
486094543b418964041685380836c5c0
-
SHA1
77f671708dab7a0c197fa88917e8184acd7eb4b6
-
SHA256
1bbec5e758d94f01b4e1d74e5b7ff2a7ed1a4ee77d06d7ffbdab6a4f73cefae6
-
SHA512
a5e37ddbe9774a3ceef8eda21ea2c5440a0c432e1f2c210aa3597b92a274d155e79b76611c6d2717badc85943a576f61e634f63a742c5d397208fb7adb15101f
-
SSDEEP
12288:Fe+4JcBpdjfoFCY0EhCv09u1dqHUsvx2jWjjwwdwDCLO2dM61KROO4:k+4mJfoIY0Zv09u1AHpp2jWjjGDvkM65
Static task
static1
Behavioral task
behavioral1
Sample
1bbec5e758d94f01b4e1d74e5b7ff2a7ed1a4ee77d06d7ffbdab6a4f73cefae6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1bbec5e758d94f01b4e1d74e5b7ff2a7ed1a4ee77d06d7ffbdab6a4f73cefae6.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
Guest16_min
149.86.65.13:1604
DCMIN_MUTEX-Z59R0DZ
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
Q4hFgbBFCulb
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
1bbec5e758d94f01b4e1d74e5b7ff2a7ed1a4ee77d06d7ffbdab6a4f73cefae6
-
Size
749KB
-
MD5
486094543b418964041685380836c5c0
-
SHA1
77f671708dab7a0c197fa88917e8184acd7eb4b6
-
SHA256
1bbec5e758d94f01b4e1d74e5b7ff2a7ed1a4ee77d06d7ffbdab6a4f73cefae6
-
SHA512
a5e37ddbe9774a3ceef8eda21ea2c5440a0c432e1f2c210aa3597b92a274d155e79b76611c6d2717badc85943a576f61e634f63a742c5d397208fb7adb15101f
-
SSDEEP
12288:Fe+4JcBpdjfoFCY0EhCv09u1dqHUsvx2jWjjwwdwDCLO2dM61KROO4:k+4mJfoIY0Zv09u1AHpp2jWjjGDvkM65
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-