General
-
Target
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2
-
Size
1.5MB
-
Sample
200706-d5plyxjb6n
-
MD5
49b156bbea23cd6434d7829ed25b051a
-
SHA1
075007dabafb065909e0d7d1cb4a1ec05724e9ec
-
SHA256
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2
-
SHA512
19dcbb72d9c3b065587731066bc4ad50968978c1569ae7aad8680722333555926a7977762674ec8d5d98add1c06b6e265b80687528b9689940dfc5c3f4c8460b
Static task
static1
Behavioral task
behavioral1
Sample
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe
Resource
win7
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2
-
Size
1.5MB
-
MD5
49b156bbea23cd6434d7829ed25b051a
-
SHA1
075007dabafb065909e0d7d1cb4a1ec05724e9ec
-
SHA256
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2
-
SHA512
19dcbb72d9c3b065587731066bc4ad50968978c1569ae7aad8680722333555926a7977762674ec8d5d98add1c06b6e265b80687528b9689940dfc5c3f4c8460b
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-