General
-
Target
60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554
-
Size
309KB
-
Sample
221108-y92qksfgd3
-
MD5
098c182508b120ea5aecb3bfe0a40c70
-
SHA1
a09b9ce8b8712cf5277213d18246cd9c0947bef9
-
SHA256
60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554
-
SHA512
c1a61730d4579e2556731fabb3e2096e3eb6f68c1d66f54f45fc903a279becb5e470f9346689a1cd79751b12a652b59dde579b00758f8b3e8d4e84ca84f51829
-
SSDEEP
6144:0ONclWWRnUh8i2sgUUJ5p9+RUkARNTO5sNjOkK7rV8L7ilH5:3/CiNmp9+RUrLO5sxK7R8KlZ
Behavioral task
behavioral1
Sample
60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
darkcomet
HF
woxpaska.no-ip.org:1604
DC_MUTEX-RZ3HY47
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
2BAgScd4816q
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554
-
Size
309KB
-
MD5
098c182508b120ea5aecb3bfe0a40c70
-
SHA1
a09b9ce8b8712cf5277213d18246cd9c0947bef9
-
SHA256
60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554
-
SHA512
c1a61730d4579e2556731fabb3e2096e3eb6f68c1d66f54f45fc903a279becb5e470f9346689a1cd79751b12a652b59dde579b00758f8b3e8d4e84ca84f51829
-
SSDEEP
6144:0ONclWWRnUh8i2sgUUJ5p9+RUkARNTO5sNjOkK7rV8L7ilH5:3/CiNmp9+RUrLO5sxK7R8KlZ
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-