General
-
Target
d64c5845a7fee27ab6942e582101c6a7c02e8df5341eaeaf6e71b7a4cb9f4e5d
-
Size
1.1MB
-
Sample
221125-x95lssad77
-
MD5
5215daaf249f78c9b132f1563bc4248e
-
SHA1
a5e64d9f47c56f8aa9ad5ad5bf8f52ab66da9ec5
-
SHA256
d64c5845a7fee27ab6942e582101c6a7c02e8df5341eaeaf6e71b7a4cb9f4e5d
-
SHA512
9da26d64021173bdaf4460d6f926e8af4a9af99f0ed9721e5df90fc7b20b687bf200b58b9faa2f0d4e5cff58e847abd16714d22120a29f82c760971c096b5f2e
-
SSDEEP
12288:ACrnoS0SkBEkazsG2sBpAY9QxLmpl2Ofe8KFFU0H/42fG31oVekukHzIOI8AAf3k:3CA+4pAYnKFFVH/01ytYf8Amse/edoa
Static task
static1
Behavioral task
behavioral1
Sample
d64c5845a7fee27ab6942e582101c6a7c02e8df5341eaeaf6e71b7a4cb9f4e5d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d64c5845a7fee27ab6942e582101c6a7c02e8df5341eaeaf6e71b7a4cb9f4e5d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
BOT
webshark.sytes.net:42250
DC_MUTEX-9KT7NBA
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ptRibxwp6WD9
-
install
true
-
offline_keylogger
false
-
password
pignouf64
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
d64c5845a7fee27ab6942e582101c6a7c02e8df5341eaeaf6e71b7a4cb9f4e5d
-
Size
1.1MB
-
MD5
5215daaf249f78c9b132f1563bc4248e
-
SHA1
a5e64d9f47c56f8aa9ad5ad5bf8f52ab66da9ec5
-
SHA256
d64c5845a7fee27ab6942e582101c6a7c02e8df5341eaeaf6e71b7a4cb9f4e5d
-
SHA512
9da26d64021173bdaf4460d6f926e8af4a9af99f0ed9721e5df90fc7b20b687bf200b58b9faa2f0d4e5cff58e847abd16714d22120a29f82c760971c096b5f2e
-
SSDEEP
12288:ACrnoS0SkBEkazsG2sBpAY9QxLmpl2Ofe8KFFU0H/42fG31oVekukHzIOI8AAf3k:3CA+4pAYnKFFVH/01ytYf8Amse/edoa
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-