General
-
Target
2abeee8718f57cf5318197003550909d.bin
-
Size
1.1MB
-
Sample
230316-hdl29ahd85
-
MD5
4bcc7ad5a00438d44241e96eb154a993
-
SHA1
e39e8a9a609312e92b752903aaa39370eb48a395
-
SHA256
3cd2280d5f2757095a3abb6f6a8a5e100376bc8e2dcd5de4e1254cdd6d01144e
-
SHA512
21d6638e3b382cabaf7d6cdd286a0262b98408d81b86f9ec7197b9fa7ca75929505e07dc4c3641b17a4f5118c3aaf56438f25135524d1235cf4b2b15d23e597a
-
SSDEEP
24576:O++ZNAJ2Uxh3KLSjg25hWU+wrJTVdxrBpyuz0WlbtgOw5SZt2:OnZNAUUvO2nWUd1r9r5z0WHgOw86
Static task
static1
Behavioral task
behavioral1
Sample
5d7f6ab4f324bfaa347af5917a59a9b633f4dd891a96870235c6509fb9e7b5d4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5d7f6ab4f324bfaa347af5917a59a9b633f4dd891a96870235c6509fb9e7b5d4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
darkcomet
luxygt
dartkom22.ddns.net:2009
DCMIN_MUTEX-UT0S86Q
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
fT1b0Py34wS5
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
5d7f6ab4f324bfaa347af5917a59a9b633f4dd891a96870235c6509fb9e7b5d4.exe
-
Size
1.4MB
-
MD5
2abeee8718f57cf5318197003550909d
-
SHA1
9e4662401cc01283eb03ad9b79a52b02713963fb
-
SHA256
5d7f6ab4f324bfaa347af5917a59a9b633f4dd891a96870235c6509fb9e7b5d4
-
SHA512
4897d94a4263451890e060a5488570c889dbd54e55fe9f4dc8c8ce00739ecf696392d9534d4f534370c59c073d496e0e5afac985cfb12b3c5d5e2a11523b06d8
-
SSDEEP
24576:tVrEOG6glVYeR74l7UiAHbdgSMs3hn3x2VpuDJGhuNKx/la60x:ttE16gLYK7BBHMox2buDYQQh060x
Score10/10-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-