General
-
Target
86c3c7f8c4ef254f6f11f41b3f02994b26ac9158cbd2be948d5441e1a103aa3f
-
Size
606KB
-
Sample
221205-cjhzwsfc63
-
MD5
428a73f481be105145733d13fef11786
-
SHA1
3a3eaf458ae395154af786608dcc20db30199967
-
SHA256
86c3c7f8c4ef254f6f11f41b3f02994b26ac9158cbd2be948d5441e1a103aa3f
-
SHA512
9c5ff99598f7bf20dd8b6272f4ab7ac9a7a1e0eb4d96e4899b397bb06b7e40777861dde18f54ea9316b4357a5745299615df3929308e938743b176111ac69b1f
-
SSDEEP
12288:aAM0fXSeLv7dC7WIUCjHaySJcRyz5VfAERUcjBVhAW6bJxg1Y:VhWXjHuZxjtX6
Static task
static1
Behavioral task
behavioral1
Sample
86c3c7f8c4ef254f6f11f41b3f02994b26ac9158cbd2be948d5441e1a103aa3f.exe
Resource
win7-20221111-en
Malware Config
Extracted
darkcomet
HF
abdelkader1313.no-ip.org:81
DC_MUTEX-4SWSAXQ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
PxBmf9ltGMpH
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
86c3c7f8c4ef254f6f11f41b3f02994b26ac9158cbd2be948d5441e1a103aa3f
-
Size
606KB
-
MD5
428a73f481be105145733d13fef11786
-
SHA1
3a3eaf458ae395154af786608dcc20db30199967
-
SHA256
86c3c7f8c4ef254f6f11f41b3f02994b26ac9158cbd2be948d5441e1a103aa3f
-
SHA512
9c5ff99598f7bf20dd8b6272f4ab7ac9a7a1e0eb4d96e4899b397bb06b7e40777861dde18f54ea9316b4357a5745299615df3929308e938743b176111ac69b1f
-
SSDEEP
12288:aAM0fXSeLv7dC7WIUCjHaySJcRyz5VfAERUcjBVhAW6bJxg1Y:VhWXjHuZxjtX6
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-