General
-
Target
aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a
-
Size
1011KB
-
Sample
221205-lfchdafb79
-
MD5
cd250f5388b3ac78ee05b78ef319fa08
-
SHA1
f5122750ebb2ff6e0bf52fd771c055035e6ea3c3
-
SHA256
aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a
-
SHA512
60df8792fd320cd8c47699ca9a098d298aaa607073c1770d7859ee73fa0943e0427c0b2e39cbaa6bb4f11f7b0a0ddf831a74ed584ddc5ee0362b8eb51bcafb10
-
SSDEEP
24576:0vOTggIRfmQX3zRYC6FVZPv+FWe4Ys/E:AjYlDZ3+UT/E
Static task
static1
Behavioral task
behavioral1
Sample
aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
HF
idonthackyou.no-ip.biz:1604
DC_MUTEX-21N6LQV
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
mhEuDRor0FUH
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a
-
Size
1011KB
-
MD5
cd250f5388b3ac78ee05b78ef319fa08
-
SHA1
f5122750ebb2ff6e0bf52fd771c055035e6ea3c3
-
SHA256
aad682a5f5ff84108172613d2c715bd6d26c79e77515cc141f42ffc6b81d620a
-
SHA512
60df8792fd320cd8c47699ca9a098d298aaa607073c1770d7859ee73fa0943e0427c0b2e39cbaa6bb4f11f7b0a0ddf831a74ed584ddc5ee0362b8eb51bcafb10
-
SSDEEP
24576:0vOTggIRfmQX3zRYC6FVZPv+FWe4Ys/E:AjYlDZ3+UT/E
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-