General
-
Target
dc4961228ae1158818c242e7e9d5e90e4412996dda31d132f96f010b0be4594b
-
Size
2.0MB
-
Sample
221123-s6qw1sgc2s
-
MD5
225a276aa4260b794e111fb89aaa484d
-
SHA1
67c88b2d40d78c8e60e2d898db0676da9d8a829f
-
SHA256
dc4961228ae1158818c242e7e9d5e90e4412996dda31d132f96f010b0be4594b
-
SHA512
f8efc5f8b278f38a3e2b134e06372282b6457d661b446837fb34849530ed452fd1a492b2b03c475ab6051abcf702dfb8fbad95e527dcaf749fa4c956ea4a1dfd
-
SSDEEP
49152:WrwMVlyQxvf7kly1IGy3nxf5mlr7IjZ/JEdZ/ZvR0O84yVuGBB:gfyQxvYsWunvnAuGBB
Static task
static1
Behavioral task
behavioral1
Sample
PO#234323.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Guest16
173.254.223.124 :2556
DC_MUTEX-4RW38P4
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
GRBqclq1WLRg
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
PO#234323.exe
-
Size
2.1MB
-
MD5
23985d8d800a7b82901526105f9c69bc
-
SHA1
41fb548fddd05c635321c380bf4440688477f9eb
-
SHA256
6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a
-
SHA512
49df2f83485f0d15c8717b804d19e5fd79e2f76f02e0ea7c839d4363b89de9eb9968392b3459dd1c17409291d69fe91d5426ab74b0fd71155684e2315823d165
-
SSDEEP
49152:taxIVry0xxf/AlgRKGY3ZXfxwlPs7IJVDVmLRzZj90w84aLuGv:ta2Fy0xxQI3oXjvouGv
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-