General
-
Target
9033eb8237373f29ab501f3d705e4d6368c2655c9b8fb2122bdb93d141519f9a
-
Size
952KB
-
Sample
221201-bsg9aafd8w
-
MD5
1b23fab35973b7f02afe4820582ef78a
-
SHA1
a2cf2ab66f58a456b137e5371b718e1f12cf78f5
-
SHA256
9033eb8237373f29ab501f3d705e4d6368c2655c9b8fb2122bdb93d141519f9a
-
SHA512
2c491aeeaab19d3fcc324cd367c399c3dd7608c3dbd9693e76bbbdc7f6732018f80d7f6286cceb41dbdc6c978e335c6d96609d0d05b8a9715070abd0f8e75a74
-
SSDEEP
24576:dzIw8LgLA5I7w6Zr8EocfBIbg/qqrUjLA:WMLnEYly90
Static task
static1
Behavioral task
behavioral1
Sample
9033eb8237373f29ab501f3d705e4d6368c2655c9b8fb2122bdb93d141519f9a.exe
Resource
win7-20221111-en
Malware Config
Extracted
darkcomet
Guest16
ultr4fucker.no-ip.org:1604
ultr4fucker.no-ip.org:1602
DC_MUTEX-XSXR7S6
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
5t77d8EWQtDn
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
svchost
Targets
-
-
Target
9033eb8237373f29ab501f3d705e4d6368c2655c9b8fb2122bdb93d141519f9a
-
Size
952KB
-
MD5
1b23fab35973b7f02afe4820582ef78a
-
SHA1
a2cf2ab66f58a456b137e5371b718e1f12cf78f5
-
SHA256
9033eb8237373f29ab501f3d705e4d6368c2655c9b8fb2122bdb93d141519f9a
-
SHA512
2c491aeeaab19d3fcc324cd367c399c3dd7608c3dbd9693e76bbbdc7f6732018f80d7f6286cceb41dbdc6c978e335c6d96609d0d05b8a9715070abd0f8e75a74
-
SSDEEP
24576:dzIw8LgLA5I7w6Zr8EocfBIbg/qqrUjLA:WMLnEYly90
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-