General
-
Target
24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812
-
Size
1018KB
-
Sample
221127-l9lcdadc7z
-
MD5
c3d2964b0ab7ec164f9170b7e576af3c
-
SHA1
9222f6cb173ca783bddea4060a8423b984f9dbc4
-
SHA256
24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812
-
SHA512
7f56c5c42366d928cd56fe1197de7aed7d1b97d7ef042da347c00e79ed01204c6a7ab1225b31b519ba575f75fc1bf16610c487021f66e765900e6cad2e0c6b2c
-
SSDEEP
12288:1naOGRGKGJcyCi0vQFDxyXN8jTE3bWYwntqiNpI5vykGexM9WK:1naRGDJcy6vQsCfKCYwntqiNuwkvC9WK
Static task
static1
Behavioral task
behavioral1
Sample
24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
Guest16
radyom.duckdns.org:1604
DC_MUTEX-WJQYLQF
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
fKsi9oKEtUJS
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812
-
Size
1018KB
-
MD5
c3d2964b0ab7ec164f9170b7e576af3c
-
SHA1
9222f6cb173ca783bddea4060a8423b984f9dbc4
-
SHA256
24e23fefbd323225b8fe905f0a0326d770c497dd5914b4bbd17294dc6cbf6812
-
SHA512
7f56c5c42366d928cd56fe1197de7aed7d1b97d7ef042da347c00e79ed01204c6a7ab1225b31b519ba575f75fc1bf16610c487021f66e765900e6cad2e0c6b2c
-
SSDEEP
12288:1naOGRGKGJcyCi0vQFDxyXN8jTE3bWYwntqiNpI5vykGexM9WK:1naRGDJcy6vQsCfKCYwntqiNuwkvC9WK
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-