Behavioral task
behavioral1
Sample
2088-330-0x0000000000400000-0x00000000004B7000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2088-330-0x0000000000400000-0x00000000004B7000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2088-330-0x0000000000400000-0x00000000004B7000-memory.dmp
-
Size
732KB
-
MD5
6656edb398c7239a16906de0f80dd037
-
SHA1
6c696918a61a9be3592d3caee4ceea70dd09b3e3
-
SHA256
fb0fa16f7e6a417fdaa3430691431fe27d662a991c9dfc8b69ca6dddc14ddf60
-
SHA512
23586cda74c2ee57511dd2cc7fda58d9701e5dcb85a1304808cf85aad9a7859841d2cc9f623b5e26b2e9e2dc13ce5bc49ccd9339ebdcf67aa89d3c0129d3f5ed
-
SSDEEP
12288:5cH9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkZQ/:6Z1xuVVjfFoynPaVBUR8f+kN10EL
Malware Config
Extracted
darkcomet
New-July-July4-0
45.74.4.244:35800
DC_MUTEX-RT27KF0
-
gencode
cKUHbX2GsGhs
-
install
false
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
false
Signatures
Files
-
2088-330-0x0000000000400000-0x00000000004B7000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 476KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 246KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE