General
-
Target
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c
-
Size
276KB
-
Sample
221123-3ry9ysgc9y
-
MD5
42d7cab85b6091321fcb6b263567dfc0
-
SHA1
ff1bd9453ca46e863ae592121a283a30ff8ab100
-
SHA256
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c
-
SHA512
051bfcd0339f74834dc564dc592b4610a1595bdd433c185752d31b93479b79f9eddc04387f3ed383230fffbd1c9c5260bc98b568a44a2a309722baaa5dd52656
-
SSDEEP
6144:5cNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PLv:5cWkbgTYWnYnt/IDYhPL
Behavioral task
behavioral1
Sample
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Anj
target29a.no-ip.org:1604
DC_MUTEX-5X8B0T9
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
di1aqw4xuhc2
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c
-
Size
276KB
-
MD5
42d7cab85b6091321fcb6b263567dfc0
-
SHA1
ff1bd9453ca46e863ae592121a283a30ff8ab100
-
SHA256
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c
-
SHA512
051bfcd0339f74834dc564dc592b4610a1595bdd433c185752d31b93479b79f9eddc04387f3ed383230fffbd1c9c5260bc98b568a44a2a309722baaa5dd52656
-
SSDEEP
6144:5cNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PLv:5cWkbgTYWnYnt/IDYhPL
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-