General
-
Target
87d15b50d421d7776fc172477de7d49123918ab52df0f90e8193544b544e1403
-
Size
1006KB
-
Sample
221126-p8s8dahc5z
-
MD5
864c25e4080be2a6b6d5167f85002776
-
SHA1
de57e561bf779ac072dea0ad6ef6e159bdbfbd91
-
SHA256
87d15b50d421d7776fc172477de7d49123918ab52df0f90e8193544b544e1403
-
SHA512
3fef58103cde734c89d0c6998adbba65fde17bf180c3fa537c33bb30c0a8044fd10847bb377c912806738f4a51b6f860eec0bfc12636140599d702010cf27ad3
-
SSDEEP
24576:kPZjcnxA4eIvFMIQ6Pr1DuBNPpJ1QPJBd3mJpMdogiUZFb5rMBdZbxh:kRcfTmIQLBUWbMWC4x
Static task
static1
Behavioral task
behavioral1
Sample
87d15b50d421d7776fc172477de7d49123918ab52df0f90e8193544b544e1403.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87d15b50d421d7776fc172477de7d49123918ab52df0f90e8193544b544e1403.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
HF
mikeemeka.ddns.net:1604
DC_MUTEX-KT2FTNQ
-
gencode
BXfLk4dndh8k
-
install
false
-
offline_keylogger
true
-
password
1234
-
persistence
false
Targets
-
-
Target
87d15b50d421d7776fc172477de7d49123918ab52df0f90e8193544b544e1403
-
Size
1006KB
-
MD5
864c25e4080be2a6b6d5167f85002776
-
SHA1
de57e561bf779ac072dea0ad6ef6e159bdbfbd91
-
SHA256
87d15b50d421d7776fc172477de7d49123918ab52df0f90e8193544b544e1403
-
SHA512
3fef58103cde734c89d0c6998adbba65fde17bf180c3fa537c33bb30c0a8044fd10847bb377c912806738f4a51b6f860eec0bfc12636140599d702010cf27ad3
-
SSDEEP
24576:kPZjcnxA4eIvFMIQ6Pr1DuBNPpJ1QPJBd3mJpMdogiUZFb5rMBdZbxh:kRcfTmIQLBUWbMWC4x
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Suspicious use of SetThreadContext
-