General
-
Target
9be9f7f0d9a3b5ca8c70f238778a8c0fac2e6e062c44dfd7397331f515be9577
-
Size
1.5MB
-
Sample
221127-nkcp2sgg4x
-
MD5
254c429729e485eb3599cb4b501212d8
-
SHA1
2e5909035b10f5f5a670a0c2609b5d74af9ff6f9
-
SHA256
9be9f7f0d9a3b5ca8c70f238778a8c0fac2e6e062c44dfd7397331f515be9577
-
SHA512
75581e17b49a108a684f3d270f235d3b43ba0ebf839864633097f7010c421bb9b2a084f9a844bf5781677668557dbad2dac9185a4a9270ea0edef49af6bf1a54
-
SSDEEP
24576:ttb20pkaCqT5TBWgNQ7a79y/if+9vwjDVuOsSzVqruTqi4YSP7FU6A:eVg5tQ7a7o/if+dwjjdVDTv4vPm5
Static task
static1
Behavioral task
behavioral1
Sample
9be9f7f0d9a3b5ca8c70f238778a8c0fac2e6e062c44dfd7397331f515be9577.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9be9f7f0d9a3b5ca8c70f238778a8c0fac2e6e062c44dfd7397331f515be9577.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
Guest16_min
nephgo.chickenkiller.com:1111
DCMIN_MUTEX-TS6ZBWR
-
gencode
nNcJ2WSWia20
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
9be9f7f0d9a3b5ca8c70f238778a8c0fac2e6e062c44dfd7397331f515be9577
-
Size
1.5MB
-
MD5
254c429729e485eb3599cb4b501212d8
-
SHA1
2e5909035b10f5f5a670a0c2609b5d74af9ff6f9
-
SHA256
9be9f7f0d9a3b5ca8c70f238778a8c0fac2e6e062c44dfd7397331f515be9577
-
SHA512
75581e17b49a108a684f3d270f235d3b43ba0ebf839864633097f7010c421bb9b2a084f9a844bf5781677668557dbad2dac9185a4a9270ea0edef49af6bf1a54
-
SSDEEP
24576:ttb20pkaCqT5TBWgNQ7a79y/if+9vwjDVuOsSzVqruTqi4YSP7FU6A:eVg5tQ7a7o/if+dwjjdVDTv4vPm5
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-