General
-
Target
daf9795cb3eb8ebf7ff2f451060b13f100de27119dc144e65edc290ec535e5d1
-
Size
1.5MB
-
Sample
201109-pwchnyl16x
-
MD5
2b7f5490fba863e91bfa7d1043eaeebe
-
SHA1
e96c7b3494f178e82085f0ea8c093e3aaf61eb11
-
SHA256
daf9795cb3eb8ebf7ff2f451060b13f100de27119dc144e65edc290ec535e5d1
-
SHA512
16a5e3224372a54363f84576ebd7abfef5196d89be2bb5f3afe326d6d85ab665c899cd64656ad6858ed2fc69c95f4ed377776a937cae10f9cd29e64a30833692
Static task
static1
Behavioral task
behavioral1
Sample
daf9795cb3eb8ebf7ff2f451060b13f100de27119dc144e65edc290ec535e5d1.exe
Resource
win7v20201028
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
daf9795cb3eb8ebf7ff2f451060b13f100de27119dc144e65edc290ec535e5d1
-
Size
1.5MB
-
MD5
2b7f5490fba863e91bfa7d1043eaeebe
-
SHA1
e96c7b3494f178e82085f0ea8c093e3aaf61eb11
-
SHA256
daf9795cb3eb8ebf7ff2f451060b13f100de27119dc144e65edc290ec535e5d1
-
SHA512
16a5e3224372a54363f84576ebd7abfef5196d89be2bb5f3afe326d6d85ab665c899cd64656ad6858ed2fc69c95f4ed377776a937cae10f9cd29e64a30833692
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-