General
-
Target
e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606
-
Size
544KB
-
Sample
221029-1qy7fshdbj
-
MD5
849b51fdc0a910ab9ccf23c999dfaa64
-
SHA1
6e293b8bafd860d54bd0e49c631fc78ef139ebc4
-
SHA256
e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606
-
SHA512
3cf460f265fccf1f8f1a5c26556bc99285050b250b2dee771a07c0625f1079a08e302e3c48b96c26e58b1d0d2e9bb814d19488af5f8dc8a95d6317b65ad9050e
-
SSDEEP
12288:QiShEbFEGI58aLqN5YRNnZd6lQghXJuUzFbPH6UksKN0fZ3:nSiktLqGdYFTv
Static task
static1
Behavioral task
behavioral1
Sample
e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Guest16
188.102.22.94:1604
DC_MUTEX-GAQJQ34
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
s7uW6TWCpQcL
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606
-
Size
544KB
-
MD5
849b51fdc0a910ab9ccf23c999dfaa64
-
SHA1
6e293b8bafd860d54bd0e49c631fc78ef139ebc4
-
SHA256
e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606
-
SHA512
3cf460f265fccf1f8f1a5c26556bc99285050b250b2dee771a07c0625f1079a08e302e3c48b96c26e58b1d0d2e9bb814d19488af5f8dc8a95d6317b65ad9050e
-
SSDEEP
12288:QiShEbFEGI58aLqN5YRNnZd6lQghXJuUzFbPH6UksKN0fZ3:nSiktLqGdYFTv
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-