General
-
Target
dcc7d9e8643c680dc44a2b7b41e5446d5e2c72b5c24a98f29ee157f188144e18
-
Size
720KB
-
Sample
221119-g4pqdsgf22
-
MD5
26a918e7cd82bd7a6d996a11f7100201
-
SHA1
cad5e730805136afd7c5b52779190b4ea31fad1b
-
SHA256
dcc7d9e8643c680dc44a2b7b41e5446d5e2c72b5c24a98f29ee157f188144e18
-
SHA512
ce98ff5d2bc9e6dbd10f90d7322c820840d741ca261e09bb58260117155ea8f10f2a0cdb59fb786ae77c521e61de19da671635a960e70f4903040a847b532c2d
-
SSDEEP
12288:te1irl7a9Gs+Dh+IELDHhDJ9vCG+WW3yW0UEJodMSIpboWagNRUhH11vWDmWd2W8:01irl7aaDhaHBfW3y/UEJo1Ihot2WNvB
Static task
static1
Behavioral task
behavioral1
Sample
dcc7d9e8643c680dc44a2b7b41e5446d5e2c72b5c24a98f29ee157f188144e18.exe
Resource
win7-20221111-en
Malware Config
Extracted
darkcomet
HF
kori.noip.me:1604
DC_MUTEX-29YSYXC
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
rCPGBafHwHQh
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
dcc7d9e8643c680dc44a2b7b41e5446d5e2c72b5c24a98f29ee157f188144e18
-
Size
720KB
-
MD5
26a918e7cd82bd7a6d996a11f7100201
-
SHA1
cad5e730805136afd7c5b52779190b4ea31fad1b
-
SHA256
dcc7d9e8643c680dc44a2b7b41e5446d5e2c72b5c24a98f29ee157f188144e18
-
SHA512
ce98ff5d2bc9e6dbd10f90d7322c820840d741ca261e09bb58260117155ea8f10f2a0cdb59fb786ae77c521e61de19da671635a960e70f4903040a847b532c2d
-
SSDEEP
12288:te1irl7a9Gs+Dh+IELDHhDJ9vCG+WW3yW0UEJodMSIpboWagNRUhH11vWDmWd2W8:01irl7aaDhaHBfW3y/UEJo1Ihot2WNvB
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-