General
-
Target
94af298055cc25499e20468a5ff648c6be40286190381df9bd580cd7460160b8
-
Size
658KB
-
Sample
221123-s6bgbsgb8y
-
MD5
c83633173c75e4587c982d385df8d72a
-
SHA1
377c3e448695942b70d2e79a104578e82b603157
-
SHA256
94af298055cc25499e20468a5ff648c6be40286190381df9bd580cd7460160b8
-
SHA512
3ed1413b7bc02e2990d90b92b771396ed3b73be2be2c829d7ffc4d5e5d1e3ed046bd56465870cbedde372d767a390ade014d3cfdfdef00e251ca4ae85cf7566b
-
SSDEEP
12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hx:+Z1xuVVjfFoynPaVBUR8f+kN10EB7
Behavioral task
behavioral1
Sample
94af298055cc25499e20468a5ff648c6be40286190381df9bd580cd7460160b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94af298055cc25499e20468a5ff648c6be40286190381df9bd580cd7460160b8.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
Guest16
cyberzak.zapto.org:8489
DC_MUTEX-AJG90QM
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
rSEzkUJGrMNQ
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
java
Targets
-
-
Target
94af298055cc25499e20468a5ff648c6be40286190381df9bd580cd7460160b8
-
Size
658KB
-
MD5
c83633173c75e4587c982d385df8d72a
-
SHA1
377c3e448695942b70d2e79a104578e82b603157
-
SHA256
94af298055cc25499e20468a5ff648c6be40286190381df9bd580cd7460160b8
-
SHA512
3ed1413b7bc02e2990d90b92b771396ed3b73be2be2c829d7ffc4d5e5d1e3ed046bd56465870cbedde372d767a390ade014d3cfdfdef00e251ca4ae85cf7566b
-
SSDEEP
12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hx:+Z1xuVVjfFoynPaVBUR8f+kN10EB7
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-