General
-
Target
3374c55ffe6c9195a538e3720cfbdb18da9f682cbb047a6347cbc285f491ffd1
-
Size
868KB
-
Sample
200624-eehx6f245n
-
MD5
8b682031e43a69d340c0ea7f05b23542
-
SHA1
0e9925fa0acdb9e377e43e6a0c4f4fa3582c8294
-
SHA256
3374c55ffe6c9195a538e3720cfbdb18da9f682cbb047a6347cbc285f491ffd1
-
SHA512
39c01453e01576daee56404477f9a251bf5a0ec841afc2457654232e0984176e20a08cfbed92c40716653605a0497683e5e70cff92e0a9a387b0da88be4a69f3
Static task
static1
Behavioral task
behavioral1
Sample
3374c55ffe6c9195a538e3720cfbdb18da9f682cbb047a6347cbc285f491ffd1.exe
Resource
win7v200430
Malware Config
Extracted
darkcomet
boss
bestabbey.chickenkiller.com:1313
DC_MUTEX-WTRM4LD
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
A2h2fBZJ72xW
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
3374c55ffe6c9195a538e3720cfbdb18da9f682cbb047a6347cbc285f491ffd1
-
Size
868KB
-
MD5
8b682031e43a69d340c0ea7f05b23542
-
SHA1
0e9925fa0acdb9e377e43e6a0c4f4fa3582c8294
-
SHA256
3374c55ffe6c9195a538e3720cfbdb18da9f682cbb047a6347cbc285f491ffd1
-
SHA512
39c01453e01576daee56404477f9a251bf5a0ec841afc2457654232e0984176e20a08cfbed92c40716653605a0497683e5e70cff92e0a9a387b0da88be4a69f3
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-