General
-
Target
35bcf8d5c18f8f939493a17a9c70faf014e15a87498c05c15b4ec9bbb3c32fb5
-
Size
1.8MB
-
Sample
221123-hns9baeb56
-
MD5
14dccd6022b3dd646b6faba60a02f9f6
-
SHA1
115d0acb064d8dc9e77dad53b04741d1820e6267
-
SHA256
35bcf8d5c18f8f939493a17a9c70faf014e15a87498c05c15b4ec9bbb3c32fb5
-
SHA512
689d657bed3a7277912eb4378d45432b55ed43aff07c2c7b2610a57fbcb0d15de30f5ffb7aa9292ec45591895c46307f53ed6d860382614e2056c5b95d91cdf0
-
SSDEEP
49152:rJZoQrbTFZY1iazOvFjzrZmMcRu0XsgR+PS4+F7xee:rtrbTA1WdH8TJXtKExee
Static task
static1
Behavioral task
behavioral1
Sample
35bcf8d5c18f8f939493a17a9c70faf014e15a87498c05c15b4ec9bbb3c32fb5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35bcf8d5c18f8f939493a17a9c70faf014e15a87498c05c15b4ec9bbb3c32fb5.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
daynasmithx.ddns.net
daynasmithx.ddns.net:100
DCMIN_MUTEX-PXNS91A
-
InstallPath
DCSCMIN\explorer.exe
-
gencode
rnNHzgvUMD43
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
explorer
Targets
-
-
Target
35bcf8d5c18f8f939493a17a9c70faf014e15a87498c05c15b4ec9bbb3c32fb5
-
Size
1.8MB
-
MD5
14dccd6022b3dd646b6faba60a02f9f6
-
SHA1
115d0acb064d8dc9e77dad53b04741d1820e6267
-
SHA256
35bcf8d5c18f8f939493a17a9c70faf014e15a87498c05c15b4ec9bbb3c32fb5
-
SHA512
689d657bed3a7277912eb4378d45432b55ed43aff07c2c7b2610a57fbcb0d15de30f5ffb7aa9292ec45591895c46307f53ed6d860382614e2056c5b95d91cdf0
-
SSDEEP
49152:rJZoQrbTFZY1iazOvFjzrZmMcRu0XsgR+PS4+F7xee:rtrbTA1WdH8TJXtKExee
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-