General
-
Target
1eb1a6cadea4a771dc4534bc6a20b6ddc6db64cf0cacc3a4b607004d3322b38d
-
Size
658KB
-
Sample
221201-lysmbaga52
-
MD5
20723c9d161aacafaa3480fc5d2cb090
-
SHA1
5c072d1e035301328bec120f6d8c6db829b5eb87
-
SHA256
1eb1a6cadea4a771dc4534bc6a20b6ddc6db64cf0cacc3a4b607004d3322b38d
-
SHA512
d5462c8e36a1889cae9e1bbec1c5b5e0566786b3306d7750d25522193bf0ff858c1a21c02cd1d55752fc5c7aa87487998c92300240d83d6890fa720590e889e3
-
SSDEEP
12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hj:+Z1xuVVjfFoynPaVBUR8f+kN10EBx
Behavioral task
behavioral1
Sample
1eb1a6cadea4a771dc4534bc6a20b6ddc6db64cf0cacc3a4b607004d3322b38d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1eb1a6cadea4a771dc4534bc6a20b6ddc6db64cf0cacc3a4b607004d3322b38d.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
WebMail Hack
furkan06.no-ip.org:81
DCMIN_MUTEX-LSA0WHE
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
t5Jsz2ZFSlr3
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
1eb1a6cadea4a771dc4534bc6a20b6ddc6db64cf0cacc3a4b607004d3322b38d
-
Size
658KB
-
MD5
20723c9d161aacafaa3480fc5d2cb090
-
SHA1
5c072d1e035301328bec120f6d8c6db829b5eb87
-
SHA256
1eb1a6cadea4a771dc4534bc6a20b6ddc6db64cf0cacc3a4b607004d3322b38d
-
SHA512
d5462c8e36a1889cae9e1bbec1c5b5e0566786b3306d7750d25522193bf0ff858c1a21c02cd1d55752fc5c7aa87487998c92300240d83d6890fa720590e889e3
-
SSDEEP
12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hj:+Z1xuVVjfFoynPaVBUR8f+kN10EBx
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-