General
-
Target
6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a
-
Size
2.1MB
-
Sample
221123-s6nrnagb9z
-
MD5
23985d8d800a7b82901526105f9c69bc
-
SHA1
41fb548fddd05c635321c380bf4440688477f9eb
-
SHA256
6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a
-
SHA512
49df2f83485f0d15c8717b804d19e5fd79e2f76f02e0ea7c839d4363b89de9eb9968392b3459dd1c17409291d69fe91d5426ab74b0fd71155684e2315823d165
-
SSDEEP
49152:taxIVry0xxf/AlgRKGY3ZXfxwlPs7IJVDVmLRzZj90w84aLuGv:ta2Fy0xxQI3oXjvouGv
Static task
static1
Behavioral task
behavioral1
Sample
6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
Guest16
173.254.223.124 :2556
DC_MUTEX-4RW38P4
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
GRBqclq1WLRg
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a
-
Size
2.1MB
-
MD5
23985d8d800a7b82901526105f9c69bc
-
SHA1
41fb548fddd05c635321c380bf4440688477f9eb
-
SHA256
6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a
-
SHA512
49df2f83485f0d15c8717b804d19e5fd79e2f76f02e0ea7c839d4363b89de9eb9968392b3459dd1c17409291d69fe91d5426ab74b0fd71155684e2315823d165
-
SSDEEP
49152:taxIVry0xxf/AlgRKGY3ZXfxwlPs7IJVDVmLRzZj90w84aLuGv:ta2Fy0xxQI3oXjvouGv
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Modifies WinLogon for persistence
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-