General
-
Target
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
-
Size
251KB
-
Sample
221030-r57ygafgfq
-
MD5
849f77e376036b2381b3a0899c705d50
-
SHA1
bf22b89aa161759dd70f3944b2e99f850dfb02ee
-
SHA256
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
-
SHA512
ba43e3a9bf54f486f038bd30a11078ed21dd3ea6484d2d2e118895c4f53431b539bbb397138b22de2043277f303240fed021d9dfc7e5e48bbbf178c6acf67efe
-
SSDEEP
6144:/YcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:wcW7KEZlPzCy37
Behavioral task
behavioral1
Sample
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Test1
roguehack.no-ip.biz:70
DC_MUTEX-1V41W5P
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
o7XD3VtoPQi3
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
-
Size
251KB
-
MD5
849f77e376036b2381b3a0899c705d50
-
SHA1
bf22b89aa161759dd70f3944b2e99f850dfb02ee
-
SHA256
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
-
SHA512
ba43e3a9bf54f486f038bd30a11078ed21dd3ea6484d2d2e118895c4f53431b539bbb397138b22de2043277f303240fed021d9dfc7e5e48bbbf178c6acf67efe
-
SSDEEP
6144:/YcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:wcW7KEZlPzCy37
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-