General
-
Target
a8fa0e6fbc8ef5b0666767f0889e900e1041fdb75e66403c01ba731fcb1ca6ee
-
Size
994KB
-
Sample
221203-f4y4dsha47
-
MD5
371fd32817ebb6ced905a86759461aa0
-
SHA1
6af815bc66d10e2a3c57483bcb69d140528bd7f5
-
SHA256
a8fa0e6fbc8ef5b0666767f0889e900e1041fdb75e66403c01ba731fcb1ca6ee
-
SHA512
0c7a8c2ff7635cdf8c7920eb05829029548a2a209a0b2ae0280ea65783195c86492c4d5b502aa7a4ce9fa280f8098c6ed61ee005498dd7e251eaa8bc00fe8bc4
-
SSDEEP
24576:xt5Dotew8MpNrpg4AK1plc0dGFHNHeJplc0dGFHNHel:xt5DYNrpgFKbWNSWNY
Static task
static1
Behavioral task
behavioral1
Sample
a8fa0e6fbc8ef5b0666767f0889e900e1041fdb75e66403c01ba731fcb1ca6ee.exe
Resource
win7-20220812-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-QBCX812
-
gencode
8G063eTs9e11
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
a8fa0e6fbc8ef5b0666767f0889e900e1041fdb75e66403c01ba731fcb1ca6ee
-
Size
994KB
-
MD5
371fd32817ebb6ced905a86759461aa0
-
SHA1
6af815bc66d10e2a3c57483bcb69d140528bd7f5
-
SHA256
a8fa0e6fbc8ef5b0666767f0889e900e1041fdb75e66403c01ba731fcb1ca6ee
-
SHA512
0c7a8c2ff7635cdf8c7920eb05829029548a2a209a0b2ae0280ea65783195c86492c4d5b502aa7a4ce9fa280f8098c6ed61ee005498dd7e251eaa8bc00fe8bc4
-
SSDEEP
24576:xt5Dotew8MpNrpg4AK1plc0dGFHNHeJplc0dGFHNHel:xt5DYNrpgFKbWNSWNY
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-