Behavioral task
behavioral1
Sample
d7993a68891b3b8d713c00e120155dcf0ee2639e19c79d9034be57310a98e2c9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d7993a68891b3b8d713c00e120155dcf0ee2639e19c79d9034be57310a98e2c9.exe
Resource
win10v2004-20220812-en
General
-
Target
d7993a68891b3b8d713c00e120155dcf0ee2639e19c79d9034be57310a98e2c9
-
Size
692KB
-
MD5
062057e867733eb1cea9720cfeb93517
-
SHA1
f1e9c5eba5490cada7e38b93d0c2808f6243c8f0
-
SHA256
d7993a68891b3b8d713c00e120155dcf0ee2639e19c79d9034be57310a98e2c9
-
SHA512
1fe30ed300fd04039f68ffb498ffde40b0f5cf0af7cb5f4cadcee8f950323992c794eda8785c33ddc1077ad4bb73e1853b2db6daaf5db1f25d2de626dcf2b793
-
SSDEEP
12288:B8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixL:6UKoN0bUxgGa/pfBHDb+y1HgZ9
Malware Config
Signatures
-
Darkcomet family
Files
-
d7993a68891b3b8d713c00e120155dcf0ee2639e19c79d9034be57310a98e2c9.exe windows x86
48f792be0a58a3a32fcce32bf32c58b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
hackhack
MethCallEngine
ord516
ord626
ord595
ord596
ord522
ord631
ord632
ord526
EVENT_SINK_AddRef
ord528
ord561
DllFunctionCall
ord563
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord607
ord608
ord717
ProcCallEngine
ord537
ord644
ord645
ord648
ord681
ord100
ord617
ord619
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 652KB - Virtual size: 648KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ