General
-
Target
9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47
-
Size
314KB
-
Sample
221130-hh37bsfc55
-
MD5
b885feb71421b4205b929d12fb69cdfe
-
SHA1
17fd2f3bee766a697c6d1fd30a29dedb38d90802
-
SHA256
9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47
-
SHA512
d9abd7fd4ef940afa2144bfb12ea62a1f251b56aadd26205c486d95e1f0a90430180167588222666978a626d0b37bec889cc9a8a1b0b54c12683640572c03f0f
-
SSDEEP
6144:fxL3BJf8bjtIT6XATveX9JbvJzM/hhPVhsBiR8PQL+mXA0H:5rH89I0DX/TJzM/hxVhsBiS4Bw+
Static task
static1
Behavioral task
behavioral1
Sample
9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
HF
leonkerr.no-ip.org:18752
DC_MUTEX-BDHL2WC
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
CA2SHRhHsuSa
-
install
true
-
offline_keylogger
true
-
password
s2dh2`t12
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47
-
Size
314KB
-
MD5
b885feb71421b4205b929d12fb69cdfe
-
SHA1
17fd2f3bee766a697c6d1fd30a29dedb38d90802
-
SHA256
9f5bbb4fc6f69e19a91cadcddcf1b2c4ffcf9f556fbaf855848ee84fa8610a47
-
SHA512
d9abd7fd4ef940afa2144bfb12ea62a1f251b56aadd26205c486d95e1f0a90430180167588222666978a626d0b37bec889cc9a8a1b0b54c12683640572c03f0f
-
SSDEEP
6144:fxL3BJf8bjtIT6XATveX9JbvJzM/hhPVhsBiR8PQL+mXA0H:5rH89I0DX/TJzM/hxVhsBiS4Bw+
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-