General
-
Target
3d04e67b03b57c0010a3c6aac0b77a267190412042cfb73c62ed53532a9160f8
-
Size
1015KB
-
Sample
221029-p2schagaf7
-
MD5
c99e3c046b196e1089652cb92b4acdd2
-
SHA1
7ceafb7f7118307dfd1e304b2c017aaab4d538ec
-
SHA256
3d04e67b03b57c0010a3c6aac0b77a267190412042cfb73c62ed53532a9160f8
-
SHA512
8f3b5b4191a04a293d6f0b094261787594012870c55e43fe6d3f0d5e20438b76415611e08e7faf89ab765851498d65cfbb0bf6437098d1ec8bba765a713c6506
-
SSDEEP
24576:/u+rKUm3C6xhvGhT72BFoSwKcid+anGwC0Nw6bPihjOGOiRVDC8X:WuQFQ/2/olKcioy5NwyPyOGv
Static task
static1
Behavioral task
behavioral1
Sample
3d04e67b03b57c0010a3c6aac0b77a267190412042cfb73c62ed53532a9160f8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3d04e67b03b57c0010a3c6aac0b77a267190412042cfb73c62ed53532a9160f8.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
darkcomet
Guest16
adigoldinnnn.no-ip.biz:200
DC_MUTEX-TAY064U
-
gencode
ydCsEuj082Up
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
3d04e67b03b57c0010a3c6aac0b77a267190412042cfb73c62ed53532a9160f8
-
Size
1015KB
-
MD5
c99e3c046b196e1089652cb92b4acdd2
-
SHA1
7ceafb7f7118307dfd1e304b2c017aaab4d538ec
-
SHA256
3d04e67b03b57c0010a3c6aac0b77a267190412042cfb73c62ed53532a9160f8
-
SHA512
8f3b5b4191a04a293d6f0b094261787594012870c55e43fe6d3f0d5e20438b76415611e08e7faf89ab765851498d65cfbb0bf6437098d1ec8bba765a713c6506
-
SSDEEP
24576:/u+rKUm3C6xhvGhT72BFoSwKcid+anGwC0Nw6bPihjOGOiRVDC8X:WuQFQ/2/olKcioy5NwyPyOGv
Score10/10-
Modifies WinLogon for persistence
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-