General
-
Target
14579b3b387f50b241893fc4f1e25159544d88f7d907e04e7962d094ce2cb8a5
-
Size
689KB
-
Sample
221123-w7nptshb2t
-
MD5
f5f4ae6b847f5e02baf94f3f0333e633
-
SHA1
05bde2c6c15c52576e14c902353afb8e22ed587c
-
SHA256
14579b3b387f50b241893fc4f1e25159544d88f7d907e04e7962d094ce2cb8a5
-
SHA512
772b8743d1da6a0378efd6353e118626b0c6252c8489c6ec338c8417d74018ed40e4e4765a499ec8429c2867ddc1bf18dad9d6ae49415d57da19700a241a6583
-
SSDEEP
12288:Id9saDxhAqrMW+vOcM3P0NKoeYmI1nn07zzOfn5+IsR4fmeC8lyEDc4i:Izs6ARW+GIKoeY9f50R4XG4i
Behavioral task
behavioral1
Sample
InvoicesDetails.scr
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Guest16
unisecurity.dyndns.org:1604
DC_MUTEX-C26Z34V
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
oWYnqqVsi0S2
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
InvoicesDetails.scr
-
Size
1.2MB
-
MD5
e269e2a3315742ce8a57d9ae10b6a488
-
SHA1
97b868eef844b411f3ff324e2e7c5a4c9418d3f3
-
SHA256
e17b7a5dc3b7a09cc45a00c1579435a4ef7863a32c48efb16030fc02b893e003
-
SHA512
561c1dc2e4c2ce0cc838bcfd240a5b860adbc8a7136e51641d99418e0354cc4b198796b436fddb5e47ff8eb5428e32281436ee5a9167cf8790c3fa405d5b73c6
-
SSDEEP
24576:PthEVaPqLsUvqlqma4y24SCHevZr5In++++++++++++++++++++++++++++++++S:TEVUcsUvqlqma4y24SCHevZr5In++++a
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-