General
-
Target
ed29c3cbe6c9859f90ba8cd6482165e634c83eaf1035b8e208356261e887e41c
-
Size
1.5MB
-
Sample
201109-7z48zltzna
-
MD5
3b5990f8f76c2d055ec864c29ea33474
-
SHA1
dd6e3d2b7f1863e57ca251d755ef088d516bd6be
-
SHA256
ed29c3cbe6c9859f90ba8cd6482165e634c83eaf1035b8e208356261e887e41c
-
SHA512
b6df346f3ebd91e08b0822ac3a29c6ed122a9d61451e8e6fd540b89890e4d760cf099057f2378e0911813cd93ed879f7109bf5a54126e3661defbe72f4a005a2
Static task
static1
Behavioral task
behavioral1
Sample
ed29c3cbe6c9859f90ba8cd6482165e634c83eaf1035b8e208356261e887e41c.exe
Resource
win7v20201028
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
ed29c3cbe6c9859f90ba8cd6482165e634c83eaf1035b8e208356261e887e41c
-
Size
1.5MB
-
MD5
3b5990f8f76c2d055ec864c29ea33474
-
SHA1
dd6e3d2b7f1863e57ca251d755ef088d516bd6be
-
SHA256
ed29c3cbe6c9859f90ba8cd6482165e634c83eaf1035b8e208356261e887e41c
-
SHA512
b6df346f3ebd91e08b0822ac3a29c6ed122a9d61451e8e6fd540b89890e4d760cf099057f2378e0911813cd93ed879f7109bf5a54126e3661defbe72f4a005a2
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-