General
-
Target
ea7a82681cd48571895600fc83f4a397ab53e420a48c1182c7afcdded1261c20
-
Size
2.6MB
-
Sample
221123-s1exkacg22
-
MD5
53dd257a8dc01c1bd6b30aabba15e298
-
SHA1
cf3c3edf42001185e713f7ccca748bfd64e8c19d
-
SHA256
ea7a82681cd48571895600fc83f4a397ab53e420a48c1182c7afcdded1261c20
-
SHA512
55f9c9b5e91814ad0bb3529b8fe8dca0a236c861099f734336d1f33ebc5ae2047492dc80c79f8f7a93f983673987b55a00838d135a005c83a389b5f451bbf3cb
-
SSDEEP
49152:OK8HEKuGsYG29+ycdwnVAT/jLY95i6vrNjhYRF3x3w1x2f:OK8HphJV9XczTss6vZho3xm
Static task
static1
Behavioral task
behavioral1
Sample
ea7a82681cd48571895600fc83f4a397ab53e420a48c1182c7afcdded1261c20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea7a82681cd48571895600fc83f4a397ab53e420a48c1182c7afcdded1261c20.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
Prvi crypt
gogica.no-ip.org:2203
DC_MUTEX-X1X9GKX
-
gencode
xvV9rrEjdJiv
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
darkcomet
DEFORS
rsnoip.ddns.net:1997
DCMIN_MUTEX-C5RDYJH
-
gencode
NToT30g4twDC
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
ea7a82681cd48571895600fc83f4a397ab53e420a48c1182c7afcdded1261c20
-
Size
2.6MB
-
MD5
53dd257a8dc01c1bd6b30aabba15e298
-
SHA1
cf3c3edf42001185e713f7ccca748bfd64e8c19d
-
SHA256
ea7a82681cd48571895600fc83f4a397ab53e420a48c1182c7afcdded1261c20
-
SHA512
55f9c9b5e91814ad0bb3529b8fe8dca0a236c861099f734336d1f33ebc5ae2047492dc80c79f8f7a93f983673987b55a00838d135a005c83a389b5f451bbf3cb
-
SSDEEP
49152:OK8HEKuGsYG29+ycdwnVAT/jLY95i6vrNjhYRF3x3w1x2f:OK8HphJV9XczTss6vZho3xm
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-