General
-
Target
183d900a7a155c3a65c15ea0e7afc396a621e970907ea5a6a9280623d64290cf
-
Size
1.5MB
-
Sample
221020-bhfmpsgbfj
-
MD5
82e3cf33fc4de1705596d7eb0fdc0f46
-
SHA1
7a5128fc9608abab93b88eacee30942e8db26b52
-
SHA256
183d900a7a155c3a65c15ea0e7afc396a621e970907ea5a6a9280623d64290cf
-
SHA512
fdea881a4900bdfabdd859535e40b93e6b95c6108389e9584cf47b41c42030cf9ebd7554383551d78e4b3e573a8482d08a3904ffcdd42823b404e0b81e4ec0a8
-
SSDEEP
24576:j2O/GlCNpZbBlZu6Ih60nGgAkaabxRrDwusN7TBIwMxXVbIK+QrFWILCTLiL2:VBXu960nGu7brDBwjkZIP8FWIL7L2
Static task
static1
Behavioral task
behavioral1
Sample
183d900a7a155c3a65c15ea0e7afc396a621e970907ea5a6a9280623d64290cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
183d900a7a155c3a65c15ea0e7afc396a621e970907ea5a6a9280623d64290cf.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
darkcomet
Guest16
r1x3r.no-ip.info:1604
DC_MUTEX-L1K5118
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
9wAm8SRjtSJo
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
183d900a7a155c3a65c15ea0e7afc396a621e970907ea5a6a9280623d64290cf
-
Size
1.5MB
-
MD5
82e3cf33fc4de1705596d7eb0fdc0f46
-
SHA1
7a5128fc9608abab93b88eacee30942e8db26b52
-
SHA256
183d900a7a155c3a65c15ea0e7afc396a621e970907ea5a6a9280623d64290cf
-
SHA512
fdea881a4900bdfabdd859535e40b93e6b95c6108389e9584cf47b41c42030cf9ebd7554383551d78e4b3e573a8482d08a3904ffcdd42823b404e0b81e4ec0a8
-
SSDEEP
24576:j2O/GlCNpZbBlZu6Ih60nGgAkaabxRrDwusN7TBIwMxXVbIK+QrFWILCTLiL2:VBXu960nGu7brDBwjkZIP8FWIL7L2
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-