General
-
Target
aa5e6ad5e69f11766d24586fd67c0ff88169c75314607b7072bff239d74c2dd9
-
Size
610KB
-
Sample
221123-qpl6dshe3z
-
MD5
54faf0f26546176482fe0e169246f9ae
-
SHA1
50349a8aa03861501b3f4c654d4ef5e2595a9c2c
-
SHA256
aa5e6ad5e69f11766d24586fd67c0ff88169c75314607b7072bff239d74c2dd9
-
SHA512
aa8fd909f397a411078509e6eb6cea743373979a1ab6bd3f43a0dcfb04633f39e481a54d27da83260692409de75a484180377471c252569f457db32504cd3ff4
-
SSDEEP
12288:wlU4xmr7+rY8SJNVtoAsGQ651D9Uymb3/DyYWqVpV+T/uJ:SU4xmf4VSbtaQ51KyIvBWqC/u
Static task
static1
Behavioral task
behavioral1
Sample
aa5e6ad5e69f11766d24586fd67c0ff88169c75314607b7072bff239d74c2dd9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa5e6ad5e69f11766d24586fd67c0ff88169c75314607b7072bff239d74c2dd9.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
FUCK
uche.ddns.net:1604
DC_MUTEX-WV2EB2L
-
InstallPath
C:\Program Files\CCleaner\CCleaner-resident.exe
-
gencode
llCl02JUQDqQ
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
CCleaner Resident Cleaner Service
Targets
-
-
Target
aa5e6ad5e69f11766d24586fd67c0ff88169c75314607b7072bff239d74c2dd9
-
Size
610KB
-
MD5
54faf0f26546176482fe0e169246f9ae
-
SHA1
50349a8aa03861501b3f4c654d4ef5e2595a9c2c
-
SHA256
aa5e6ad5e69f11766d24586fd67c0ff88169c75314607b7072bff239d74c2dd9
-
SHA512
aa8fd909f397a411078509e6eb6cea743373979a1ab6bd3f43a0dcfb04633f39e481a54d27da83260692409de75a484180377471c252569f457db32504cd3ff4
-
SSDEEP
12288:wlU4xmr7+rY8SJNVtoAsGQ651D9Uymb3/DyYWqVpV+T/uJ:SU4xmf4VSbtaQ51KyIvBWqC/u
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-