General
-
Target
052f94ad08bd9cee158f54a45c730567ebc2b4c21a856633591987062606b5ab
-
Size
1.5MB
-
Sample
201109-jprpjtht7n
-
MD5
2b5fba7f10b88271d914c41b330435fd
-
SHA1
8099fa14e66909326124db5eba9e6c0cff13d90e
-
SHA256
052f94ad08bd9cee158f54a45c730567ebc2b4c21a856633591987062606b5ab
-
SHA512
f3c8cab666c8ef74c93afd5ed8089ba79789adaedacacef1f5259833e4dc454b1b17ed7a3c87d4130dfb7569ba0cc61f2c6480796136ebc38df27a74915eb374
Static task
static1
Behavioral task
behavioral1
Sample
052f94ad08bd9cee158f54a45c730567ebc2b4c21a856633591987062606b5ab.exe
Resource
win7v20201028
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
052f94ad08bd9cee158f54a45c730567ebc2b4c21a856633591987062606b5ab
-
Size
1.5MB
-
MD5
2b5fba7f10b88271d914c41b330435fd
-
SHA1
8099fa14e66909326124db5eba9e6c0cff13d90e
-
SHA256
052f94ad08bd9cee158f54a45c730567ebc2b4c21a856633591987062606b5ab
-
SHA512
f3c8cab666c8ef74c93afd5ed8089ba79789adaedacacef1f5259833e4dc454b1b17ed7a3c87d4130dfb7569ba0cc61f2c6480796136ebc38df27a74915eb374
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-