General
-
Target
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f
-
Size
800KB
-
Sample
221020-z1sxraegbj
-
MD5
962b6297bfe02e597197fc3d104558f0
-
SHA1
1cf73f2d2e62f6076466bc8dbeed93aaa44643ca
-
SHA256
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f
-
SHA512
85d663827c02c509705e2a689bf520fdd0b82d68e2f3e9cf0fe9b1b239425685c37636ce9fc74412630b668dc80fba8a1c13dc7bbaec40af0bc90aade95616fb
-
SSDEEP
12288:qS1hFDxZFbhf3T/aBkuqyGunESWdXYwPaF4dDenvKv+Ie:1FPH7YkTvSWN5PI4M9I
Static task
static1
Behavioral task
behavioral1
Sample
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
darkcomet
Guest16
185.84.181.81:100
DC_MUTEX-0DKXA0V
-
gencode
M5VVBQQEtzRs
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
pony
http://lynch.herobo.com/pcss/gate.php
Targets
-
-
Target
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f
-
Size
800KB
-
MD5
962b6297bfe02e597197fc3d104558f0
-
SHA1
1cf73f2d2e62f6076466bc8dbeed93aaa44643ca
-
SHA256
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f
-
SHA512
85d663827c02c509705e2a689bf520fdd0b82d68e2f3e9cf0fe9b1b239425685c37636ce9fc74412630b668dc80fba8a1c13dc7bbaec40af0bc90aade95616fb
-
SSDEEP
12288:qS1hFDxZFbhf3T/aBkuqyGunESWdXYwPaF4dDenvKv+Ie:1FPH7YkTvSWN5PI4M9I
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-