General
-
Target
e03f222360351f9333ff0270a3fed39e1b6416328d13a9846b732af2bbf8c39f
-
Size
1.5MB
-
Sample
200706-gays56j11j
-
MD5
7cc85df763a92dfc8c4102121b931cc2
-
SHA1
334842967271d72a6d5e12c60c484fd5acb92be1
-
SHA256
e03f222360351f9333ff0270a3fed39e1b6416328d13a9846b732af2bbf8c39f
-
SHA512
3606a6d7d0850ba4b16b34e889b280c0a2ebf95c40e6b45cd6dec6a6103192c1d5a9819e7b9dd4dbf8dc04f034be468eda2a47ef8d745c0a4a66c4d405e07ce9
Static task
static1
Behavioral task
behavioral1
Sample
e03f222360351f9333ff0270a3fed39e1b6416328d13a9846b732af2bbf8c39f.exe
Resource
win7
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
e03f222360351f9333ff0270a3fed39e1b6416328d13a9846b732af2bbf8c39f
-
Size
1.5MB
-
MD5
7cc85df763a92dfc8c4102121b931cc2
-
SHA1
334842967271d72a6d5e12c60c484fd5acb92be1
-
SHA256
e03f222360351f9333ff0270a3fed39e1b6416328d13a9846b732af2bbf8c39f
-
SHA512
3606a6d7d0850ba4b16b34e889b280c0a2ebf95c40e6b45cd6dec6a6103192c1d5a9819e7b9dd4dbf8dc04f034be468eda2a47ef8d745c0a4a66c4d405e07ce9
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-