General
-
Target
3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad
-
Size
2.2MB
-
Sample
221121-2r8b7aad27
-
MD5
6f2e7f922d910aa5bfbecd599840db61
-
SHA1
fba2bb7ea13174169eb5c1e5f0fedab0af1f6837
-
SHA256
3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad
-
SHA512
584537a4c03aaf28da07f57ea6610471e3007ad226e4bb76b53ffe986f0f31b96be83ef5b8a8bc4134ed0d2af7a22f648899d176d4f0ace9b48e077dbea5d2fa
-
SSDEEP
49152:Ykwkn9IMHeaCgRYJFTGYPyutFs+sLTDLNIoaPCS:jdnVSJFiuk+sLTF2PC
Static task
static1
Behavioral task
behavioral1
Sample
3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Guesttest
hottstuff.ddns.net:200
DC_MUTEX-MM87GQX
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
DD1cXi5kpA3j
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
rundll32
Targets
-
-
Target
3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad
-
Size
2.2MB
-
MD5
6f2e7f922d910aa5bfbecd599840db61
-
SHA1
fba2bb7ea13174169eb5c1e5f0fedab0af1f6837
-
SHA256
3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad
-
SHA512
584537a4c03aaf28da07f57ea6610471e3007ad226e4bb76b53ffe986f0f31b96be83ef5b8a8bc4134ed0d2af7a22f648899d176d4f0ace9b48e077dbea5d2fa
-
SSDEEP
49152:Ykwkn9IMHeaCgRYJFTGYPyutFs+sLTDLNIoaPCS:jdnVSJFiuk+sLTF2PC
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-