General
-
Target
f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6
-
Size
736KB
-
Sample
221123-pywkrace84
-
MD5
b9c45d0a273155427b7e8a62cf078f98
-
SHA1
6963c693c509fa77cb7c30b73f354abb16b76280
-
SHA256
f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6
-
SHA512
ce344702ad071b93d3c2ef62bfd0c2d7f52f7c2a3a03ca08d48602bb732ebe713ebe699bc204690c3f714c83baf9c12103fed9dedeb4c1816fe672a2699ed3bc
-
SSDEEP
12288:q/fOk8VleKE+9HAHrsRfaRLOr0Oa+6QXRkppQQiS:sOllCgFmLO4W6QhkU
Static task
static1
Behavioral task
behavioral1
Sample
f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
Abd_kca
haxexploit.no-ip.biz:443
DCMIN_MUTEX-SK7VXA9
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
XsyrH3n3kub1
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6
-
Size
736KB
-
MD5
b9c45d0a273155427b7e8a62cf078f98
-
SHA1
6963c693c509fa77cb7c30b73f354abb16b76280
-
SHA256
f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6
-
SHA512
ce344702ad071b93d3c2ef62bfd0c2d7f52f7c2a3a03ca08d48602bb732ebe713ebe699bc204690c3f714c83baf9c12103fed9dedeb4c1816fe672a2699ed3bc
-
SSDEEP
12288:q/fOk8VleKE+9HAHrsRfaRLOr0Oa+6QXRkppQQiS:sOllCgFmLO4W6QhkU
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-