General
-
Target
c4aa169ee13a211e014518b9be4557bddf90ab0466a5260897c5e43924f2d238
-
Size
719KB
-
Sample
221203-f79z3acf4z
-
MD5
3acce031a32ede50b23252c1ee0b6303
-
SHA1
52f9df300181cb6c0f87aa9a1b5f344997d9092b
-
SHA256
c4aa169ee13a211e014518b9be4557bddf90ab0466a5260897c5e43924f2d238
-
SHA512
e96b4e21b0590598493377d13460ed043fd092da3ebe8e6f39d6baf0c001e7e6d5a3fe3556447d06a6cd349d1a40c085cc5f347718338812a1106699db1e9357
-
SSDEEP
12288:mbFenA3ajdvPOFU6KRXqAFdaQ8bAsxZS1eiuBRiO0rVGOsr1dXf7WPAa0paLcfeR:mbFengulOFU6eqidF8b7SciuBgTGXrbg
Static task
static1
Behavioral task
behavioral1
Sample
c4aa169ee13a211e014518b9be4557bddf90ab0466a5260897c5e43924f2d238.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4aa169ee13a211e014518b9be4557bddf90ab0466a5260897c5e43924f2d238.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
Booter
connecttome.no-ip.biz:2000
DC_MUTEX-EERK2UQ
-
gencode
hjSim3V9N4tt
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
c4aa169ee13a211e014518b9be4557bddf90ab0466a5260897c5e43924f2d238
-
Size
719KB
-
MD5
3acce031a32ede50b23252c1ee0b6303
-
SHA1
52f9df300181cb6c0f87aa9a1b5f344997d9092b
-
SHA256
c4aa169ee13a211e014518b9be4557bddf90ab0466a5260897c5e43924f2d238
-
SHA512
e96b4e21b0590598493377d13460ed043fd092da3ebe8e6f39d6baf0c001e7e6d5a3fe3556447d06a6cd349d1a40c085cc5f347718338812a1106699db1e9357
-
SSDEEP
12288:mbFenA3ajdvPOFU6KRXqAFdaQ8bAsxZS1eiuBRiO0rVGOsr1dXf7WPAa0paLcfeR:mbFengulOFU6eqidF8b7SciuBgTGXrbg
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-