General
-
Target
7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5
-
Size
348KB
-
Sample
221030-vw2lwabeh8
-
MD5
8315a21cdfdc88c3b9b4fdaf2d4f2030
-
SHA1
c92828e2d3dbaf2843088ce86b7296ca72d5d86f
-
SHA256
7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5
-
SHA512
9db22c6a8fc369d5c9a401fa6ccb81667f84110283e6a403cc186f456526d4a7b28657ea2feb6e0bd4dc2539128c2b08bb60872106aca48fca8756f003a9ba3c
-
SSDEEP
6144:mqLzGyzpKalLBQmByWWwf/vNsr9Rpef3jPrkIqn9dwbmIdsculFmQRMoZVK4Si:NphltQT29S9Rpe7Prk9PiFwFmQ9G4S
Static task
static1
Behavioral task
behavioral1
Sample
7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Kermoot
kermootseven.no-ip.biz:1604
DC_MUTEX-R2MRZT9
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
EkKq5HcgPaSa
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate777
Targets
-
-
Target
7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5
-
Size
348KB
-
MD5
8315a21cdfdc88c3b9b4fdaf2d4f2030
-
SHA1
c92828e2d3dbaf2843088ce86b7296ca72d5d86f
-
SHA256
7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5
-
SHA512
9db22c6a8fc369d5c9a401fa6ccb81667f84110283e6a403cc186f456526d4a7b28657ea2feb6e0bd4dc2539128c2b08bb60872106aca48fca8756f003a9ba3c
-
SSDEEP
6144:mqLzGyzpKalLBQmByWWwf/vNsr9Rpef3jPrkIqn9dwbmIdsculFmQRMoZVK4Si:NphltQT29S9Rpe7Prk9PiFwFmQ9G4S
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-