General
-
Target
6c40aef64da6fcf46edffd34f1336cf88614442e913cb5625c44623716618620
-
Size
468KB
-
Sample
221127-w2gz4ada7v
-
MD5
2b1f3da716f5ff437d6a2186e47c8d12
-
SHA1
3fdf5f818d5debec67d7ebfd019e97bab624521c
-
SHA256
6c40aef64da6fcf46edffd34f1336cf88614442e913cb5625c44623716618620
-
SHA512
9ed2f92576941cb01367b55553826f03a763365d0421f6c2c28ba8cd0fd35e59d402950e6ff733f7e1c130f67120c952e4a1d6b015e71ff532b878d8de9d9bdb
-
SSDEEP
12288:NK7EnmlS50Cg7IyuovPoZWUciMFVHAR5e:NKL0505HHCWTF
Static task
static1
Behavioral task
behavioral1
Sample
6c40aef64da6fcf46edffd34f1336cf88614442e913cb5625c44623716618620.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Guest16
217.66.227.219:1604
127.0.0.1:1604
DC_MUTEX-MKYS5AZ
-
InstallPath
MSDCSC\msdcsci.exe
-
gencode
cxX39ceN4xo6
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
IUjkr4
Targets
-
-
Target
6c40aef64da6fcf46edffd34f1336cf88614442e913cb5625c44623716618620
-
Size
468KB
-
MD5
2b1f3da716f5ff437d6a2186e47c8d12
-
SHA1
3fdf5f818d5debec67d7ebfd019e97bab624521c
-
SHA256
6c40aef64da6fcf46edffd34f1336cf88614442e913cb5625c44623716618620
-
SHA512
9ed2f92576941cb01367b55553826f03a763365d0421f6c2c28ba8cd0fd35e59d402950e6ff733f7e1c130f67120c952e4a1d6b015e71ff532b878d8de9d9bdb
-
SSDEEP
12288:NK7EnmlS50Cg7IyuovPoZWUciMFVHAR5e:NKL0505HHCWTF
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-