General
-
Target
b96697777782b12c83a6791e7ab2e4bddc8afaf784716b3b7dac84f710f521da
-
Size
585KB
-
Sample
221125-3hjsxahg3v
-
MD5
733284fd88c1db268eb8d011b4ab155a
-
SHA1
7905d4a7cdcf06ba4fac0cda840d409e90e4325f
-
SHA256
b96697777782b12c83a6791e7ab2e4bddc8afaf784716b3b7dac84f710f521da
-
SHA512
4a4fbf796be223c1b3b7f6774cf2917f5787a3c73c3b32c7b12307f54bbcb89c8d3d4607d34d1b87e2df95839304fc92b28a169f5d8a33ca41cfc6896322e118
-
SSDEEP
12288:Si0+UP5VGcS2/cpcxLES/DFpCi1X3JKnNvwFBmz0QRcxA:zW5SnOufi/FBiD6S
Static task
static1
Behavioral task
behavioral1
Sample
b96697777782b12c83a6791e7ab2e4bddc8afaf784716b3b7dac84f710f521da.exe
Resource
win7-20220901-en
Malware Config
Extracted
darkcomet
Guest16
homeserver83.no-ip.org:1604
dwer7685bzbb5zb5
-
gencode
tnTKlQcQtkbM
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
b96697777782b12c83a6791e7ab2e4bddc8afaf784716b3b7dac84f710f521da
-
Size
585KB
-
MD5
733284fd88c1db268eb8d011b4ab155a
-
SHA1
7905d4a7cdcf06ba4fac0cda840d409e90e4325f
-
SHA256
b96697777782b12c83a6791e7ab2e4bddc8afaf784716b3b7dac84f710f521da
-
SHA512
4a4fbf796be223c1b3b7f6774cf2917f5787a3c73c3b32c7b12307f54bbcb89c8d3d4607d34d1b87e2df95839304fc92b28a169f5d8a33ca41cfc6896322e118
-
SSDEEP
12288:Si0+UP5VGcS2/cpcxLES/DFpCi1X3JKnNvwFBmz0QRcxA:zW5SnOufi/FBiD6S
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-