General
-
Target
1308-72-0x0000000000400000-0x00000000004B2000-memory.dmp
-
Size
712KB
-
Sample
220711-p5s37sbfc4
-
MD5
5055ad823b65336069f4c78da7c0b4d4
-
SHA1
734062d6c2abc72600b50124c1eb47fcf9eef6a2
-
SHA256
82573067bc5b4b0e46ee8f2d75686b94c0f18379cb2d6ac23126a7e80e011acb
-
SHA512
bcfeff457b8a6dc3973d42c36f0ae07f65b704118da2ed281b6a7a1c7c09ec6a19952e76f7be8f65dc53136b955112105a65c06c5a5f3f33542898a465327b95
Behavioral task
behavioral1
Sample
1308-72-0x0000000000400000-0x00000000004B2000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1308-72-0x0000000000400000-0x00000000004B2000-memory.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
darkcomet
Guest16
gameservice.ddns.net:4320
DC_MUTEX-WBUNVXD
-
InstallPath
AudioDriver\taskhost.exe
-
gencode
EWSsWwgyJrUD
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
AudioDriver
Targets
-
-
Target
1308-72-0x0000000000400000-0x00000000004B2000-memory.dmp
-
Size
712KB
-
MD5
5055ad823b65336069f4c78da7c0b4d4
-
SHA1
734062d6c2abc72600b50124c1eb47fcf9eef6a2
-
SHA256
82573067bc5b4b0e46ee8f2d75686b94c0f18379cb2d6ac23126a7e80e011acb
-
SHA512
bcfeff457b8a6dc3973d42c36f0ae07f65b704118da2ed281b6a7a1c7c09ec6a19952e76f7be8f65dc53136b955112105a65c06c5a5f3f33542898a465327b95
Score1/10 -