General
-
Target
e4362f31aa37f753652b5adedf8d51ae92a4f74360698d6be7cfdef5b4ea4462
-
Size
756KB
-
Sample
221201-act3gabh6x
-
MD5
37b1b9a771f5272742a70f2d90185469
-
SHA1
5f8be95104ec96105e87fa54071a2cc4acad668b
-
SHA256
e4362f31aa37f753652b5adedf8d51ae92a4f74360698d6be7cfdef5b4ea4462
-
SHA512
583c9e3f9cbca53f840e4ff373bea5393775e16111788fd73b12657ca4e2b212e331195bb754367715f26d3824df95f677cd7013c1d9806a1e3933f6342e857a
-
SSDEEP
12288:e9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/ha:qZ1xuVVjfFoynPaVBUR8f+kN10EB0
Behavioral task
behavioral1
Sample
e4362f31aa37f753652b5adedf8d51ae92a4f74360698d6be7cfdef5b4ea4462.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4362f31aa37f753652b5adedf8d51ae92a4f74360698d6be7cfdef5b4ea4462.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
HF
jeton.no-ip.org:1604
DC_MUTEX-AFGB0CE
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
3munUSYdE4Yp
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
e4362f31aa37f753652b5adedf8d51ae92a4f74360698d6be7cfdef5b4ea4462
-
Size
756KB
-
MD5
37b1b9a771f5272742a70f2d90185469
-
SHA1
5f8be95104ec96105e87fa54071a2cc4acad668b
-
SHA256
e4362f31aa37f753652b5adedf8d51ae92a4f74360698d6be7cfdef5b4ea4462
-
SHA512
583c9e3f9cbca53f840e4ff373bea5393775e16111788fd73b12657ca4e2b212e331195bb754367715f26d3824df95f677cd7013c1d9806a1e3933f6342e857a
-
SSDEEP
12288:e9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/ha:qZ1xuVVjfFoynPaVBUR8f+kN10EB0
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-