General
-
Target
cb27f617c56a7c054ad17cc4a113217de71b35dbfb7ac2cb3ee603b977eb090b
-
Size
1.5MB
-
Sample
200629-hx3sv5xz42
-
MD5
3af8b81da0b252a1a038f1632fde9b1e
-
SHA1
4efd1cafa0d0c1919f804c8a6572b961ae15e490
-
SHA256
cb27f617c56a7c054ad17cc4a113217de71b35dbfb7ac2cb3ee603b977eb090b
-
SHA512
f3c4cbdc4bb3a343ae03eec1182e3ef21f833666ec7a1399fbcb390bfe72de029da75221a660369b9fb2764f57a2cac0407cbfb5b9587925c4efe474b4cf6abc
Static task
static1
Behavioral task
behavioral1
Sample
cb27f617c56a7c054ad17cc4a113217de71b35dbfb7ac2cb3ee603b977eb090b.exe
Resource
win7v200430
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
cb27f617c56a7c054ad17cc4a113217de71b35dbfb7ac2cb3ee603b977eb090b
-
Size
1.5MB
-
MD5
3af8b81da0b252a1a038f1632fde9b1e
-
SHA1
4efd1cafa0d0c1919f804c8a6572b961ae15e490
-
SHA256
cb27f617c56a7c054ad17cc4a113217de71b35dbfb7ac2cb3ee603b977eb090b
-
SHA512
f3c4cbdc4bb3a343ae03eec1182e3ef21f833666ec7a1399fbcb390bfe72de029da75221a660369b9fb2764f57a2cac0407cbfb5b9587925c4efe474b4cf6abc
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-