General
-
Target
daf153c8c96b58f17b27eaa1b7940323b85ddfe059991a5ed8d57b750aaf17f1
-
Size
1.2MB
-
Sample
221203-eefebacc22
-
MD5
2d1552fc4d7061d7ff2d0bb329f93e70
-
SHA1
cda6295ea30076e323b49405be0e61319d037e69
-
SHA256
daf153c8c96b58f17b27eaa1b7940323b85ddfe059991a5ed8d57b750aaf17f1
-
SHA512
b544a1cdaa9ab1a30ba5f888ecdec0c4336ff7abde5b60ec0080c4ef9ed86d1902ee752f2e46fa7b6182a4ace735905ac3aa0c716ea38a1f7610736b531643b9
-
SSDEEP
12288:RjFPs8PRJ7xEhU4X2EV+luiIPBLX8eI+LchMP+8uQBiJSKfK5tjZAp6q8g/6PmSJ:nZrAIIMqhPZ5IZGZcUYw62mY
Static task
static1
Behavioral task
behavioral1
Sample
daf153c8c96b58f17b27eaa1b7940323b85ddfe059991a5ed8d57b750aaf17f1.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
zombk
zombk.no-ip.org:1500
127.0.0.1:1500
192.168.1.43:1500
DC_MUTEX-DR20D9S
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
2hEkSK4e2CCs
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
daf153c8c96b58f17b27eaa1b7940323b85ddfe059991a5ed8d57b750aaf17f1
-
Size
1.2MB
-
MD5
2d1552fc4d7061d7ff2d0bb329f93e70
-
SHA1
cda6295ea30076e323b49405be0e61319d037e69
-
SHA256
daf153c8c96b58f17b27eaa1b7940323b85ddfe059991a5ed8d57b750aaf17f1
-
SHA512
b544a1cdaa9ab1a30ba5f888ecdec0c4336ff7abde5b60ec0080c4ef9ed86d1902ee752f2e46fa7b6182a4ace735905ac3aa0c716ea38a1f7610736b531643b9
-
SSDEEP
12288:RjFPs8PRJ7xEhU4X2EV+luiIPBLX8eI+LchMP+8uQBiJSKfK5tjZAp6q8g/6PmSJ:nZrAIIMqhPZ5IZGZcUYw62mY
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-