General
-
Target
ec081c84c6da33651fd18c2bb802961b843f3b144322a4d465de6d89e605bea1
-
Size
592KB
-
Sample
221130-ya5m7ahc85
-
MD5
fb892771efaaa2b9ab9ed77445dc2ba5
-
SHA1
1261001563728e62355edb3c053485105fee5fdc
-
SHA256
ec081c84c6da33651fd18c2bb802961b843f3b144322a4d465de6d89e605bea1
-
SHA512
4fd967fe758d274c6ad298eaed2d728cc151117fc6d15a1e6219e791d9027731e37fb6a6e00705161df7573a9f949f5d122286e7d7a230fcc51528fee20e7d1b
-
SSDEEP
12288:nTtLR4h32Giajs2haI7zUr+hDIioRCPy2hvzlO:G/izEaAzUK0RCPdl
Static task
static1
Behavioral task
behavioral1
Sample
ec081c84c6da33651fd18c2bb802961b843f3b144322a4d465de6d89e605bea1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec081c84c6da33651fd18c2bb802961b843f3b144322a4d465de6d89e605bea1.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
darkcomet
Guest16
stroxo.no-ip.org:1604
DC_MUTEX-T8LVDPZ
-
gencode
QgBdwlQo4r7q
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
ec081c84c6da33651fd18c2bb802961b843f3b144322a4d465de6d89e605bea1
-
Size
592KB
-
MD5
fb892771efaaa2b9ab9ed77445dc2ba5
-
SHA1
1261001563728e62355edb3c053485105fee5fdc
-
SHA256
ec081c84c6da33651fd18c2bb802961b843f3b144322a4d465de6d89e605bea1
-
SHA512
4fd967fe758d274c6ad298eaed2d728cc151117fc6d15a1e6219e791d9027731e37fb6a6e00705161df7573a9f949f5d122286e7d7a230fcc51528fee20e7d1b
-
SSDEEP
12288:nTtLR4h32Giajs2haI7zUr+hDIioRCPy2hvzlO:G/izEaAzUK0RCPdl
Score10/10-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-