General
-
Target
2e12e3f3ff72d103fb2314be622cb85d3dc824ea8b74eb2b5df9be7035354003
-
Size
1.5MB
-
Sample
201109-qk7e5cbp1j
-
MD5
a3067176161213b6efe72cdbf37f374e
-
SHA1
66e2c3a6ce89d96691349178700ba67f7fd3f453
-
SHA256
2e12e3f3ff72d103fb2314be622cb85d3dc824ea8b74eb2b5df9be7035354003
-
SHA512
f76d8105fb85dd7ceb4e3c1381fc137c38d2cfefaf9181a3c2465a936ae9548c6b735c3ee16fd092e63bddf5257a69c3718d0086503daacb7e18ef2d67374086
Static task
static1
Behavioral task
behavioral1
Sample
2e12e3f3ff72d103fb2314be622cb85d3dc824ea8b74eb2b5df9be7035354003.exe
Resource
win7v20201028
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
2e12e3f3ff72d103fb2314be622cb85d3dc824ea8b74eb2b5df9be7035354003
-
Size
1.5MB
-
MD5
a3067176161213b6efe72cdbf37f374e
-
SHA1
66e2c3a6ce89d96691349178700ba67f7fd3f453
-
SHA256
2e12e3f3ff72d103fb2314be622cb85d3dc824ea8b74eb2b5df9be7035354003
-
SHA512
f76d8105fb85dd7ceb4e3c1381fc137c38d2cfefaf9181a3c2465a936ae9548c6b735c3ee16fd092e63bddf5257a69c3718d0086503daacb7e18ef2d67374086
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-