General
-
Target
70cff7636e0aaaef0cf817cbdb6c1375706e711a.zip.tar.gz
-
Size
12.9MB
-
Sample
241128-w3v84swkcw
-
MD5
ac7dceb4a85cb4250ac1268f8a3d7481
-
SHA1
fdc57ca604746204049368a5d23e6c2893590d42
-
SHA256
38a22130997f3fd2afd7d0773735c729eca349ad93455866ad02543109f4329a
-
SHA512
912cf8aaa594e0838d332fd5d67c1b212887adffcaf765911dda048e23c7e57d4531cb3395cf57f9be6e12c79402863c21af605dfabee854c0dd3e2e435533fd
-
SSDEEP
196608:6Gy8SAdVkkiPx5yAPpl0AOIy/w4n2uMhrM0yEtWoGcUKJvbdS8VylZhBqhcDy:6Gy8LXBIRo6u6rM0LgkUKJzdSLnhkN
Static task
static1
Behavioral task
behavioral1
Sample
70cff7636e0aaaef0cf817cbdb6c1375706e711a.zip.tar.zip
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
0.5.8
Default
192.168.101.7:6606
192.168.101.7:7707
192.168.101.7:8808
192.168.101.7:1111
192.168.101.7:2222
192.168.101.7:3333
192.168.101.7:4444
192.168.101.7:5555
192.168.101.7:6666
192.168.101.7:7777
192.168.101.7:8888
192.168.101.7:9999
H6EV9c34IZEW
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
darkcomet
Guest16
192.168.101.7:1604
192.168.101.7:1605
192.168.101.7:1606
192.168.101.7:1607
192.168.101.7:1608
192.168.101.7:1609
192.168.101.7:1610
192.168.101.7:1611
192.168.101.7:1612
192.168.101.7:1613
192.168.101.7:1614
192.168.101.7:1615
192.168.101.7:1616
192.168.101.7:1617
192.168.101.7:1618
192.168.101.7:1619
192.168.101.7:1620
192.168.101.7:1621
192.168.101.7:1622
192.168.101.7:1623
DC_MUTEX-J7WY70H
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
a7kB2AAlrgH4
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
70cff7636e0aaaef0cf817cbdb6c1375706e711a.zip.tar.gz
-
Size
12.9MB
-
MD5
ac7dceb4a85cb4250ac1268f8a3d7481
-
SHA1
fdc57ca604746204049368a5d23e6c2893590d42
-
SHA256
38a22130997f3fd2afd7d0773735c729eca349ad93455866ad02543109f4329a
-
SHA512
912cf8aaa594e0838d332fd5d67c1b212887adffcaf765911dda048e23c7e57d4531cb3395cf57f9be6e12c79402863c21af605dfabee854c0dd3e2e435533fd
-
SSDEEP
196608:6Gy8SAdVkkiPx5yAPpl0AOIy/w4n2uMhrM0yEtWoGcUKJvbdS8VylZhBqhcDy:6Gy8LXBIRo6u6rM0LgkUKJzdSLnhkN
-
Asyncrat family
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2