General
-
Target
7a7ecaf29b080cf0b0235a470f13ae9abaf361a5298a500b8ed3a75d57853f04
-
Size
899KB
-
Sample
221125-k9rnqaff66
-
MD5
b27c19ec70b1dd4cf494bd51dfdeeb9f
-
SHA1
d3cbabc40a2cf7e9f74ed837a730037cb3f2641b
-
SHA256
7a7ecaf29b080cf0b0235a470f13ae9abaf361a5298a500b8ed3a75d57853f04
-
SHA512
a332e9148af245cf11339e5a3308fa1713cc33a011a110c839442027bd2cd952a38aa95be6e76219386e037270974f236e5f7f5260a0d10628f6285f850a9b4f
-
SSDEEP
12288:az7LI28qVU4SSUS8cl6crU+39M34LmDbvUyHotFGQajLhcpBGV8XfvbQY6s9i0Vd:afU2pBQ1cx3904rtYgaZkNVd
Static task
static1
Behavioral task
behavioral1
Sample
7a7ecaf29b080cf0b0235a470f13ae9abaf361a5298a500b8ed3a75d57853f04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a7ecaf29b080cf0b0235a470f13ae9abaf361a5298a500b8ed3a75d57853f04.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
ayyýldýztim2
ayyildiztim06.dds.net:4919
DC_MUTEX-51KGM4F
-
InstallPath
MSDCSC\svchost.exe
-
gencode
w98gEx0KRcX2
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
svchost
Targets
-
-
Target
7a7ecaf29b080cf0b0235a470f13ae9abaf361a5298a500b8ed3a75d57853f04
-
Size
899KB
-
MD5
b27c19ec70b1dd4cf494bd51dfdeeb9f
-
SHA1
d3cbabc40a2cf7e9f74ed837a730037cb3f2641b
-
SHA256
7a7ecaf29b080cf0b0235a470f13ae9abaf361a5298a500b8ed3a75d57853f04
-
SHA512
a332e9148af245cf11339e5a3308fa1713cc33a011a110c839442027bd2cd952a38aa95be6e76219386e037270974f236e5f7f5260a0d10628f6285f850a9b4f
-
SSDEEP
12288:az7LI28qVU4SSUS8cl6crU+39M34LmDbvUyHotFGQajLhcpBGV8XfvbQY6s9i0Vd:afU2pBQ1cx3904rtYgaZkNVd
Score10/10-
Modifies WinLogon for persistence
-
Modifies security service
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-