General

  • Target

    1632-71-0x0000000000400000-0x00000000004BA000-memory.dmp

  • Size

    744KB

  • Sample

    230207-qtwwdsfb6v

  • MD5

    69f43aa455e7110e54dc0e8cf52870e4

  • SHA1

    a76f43ad17c361f3388f3ae8007e1be056f39661

  • SHA256

    0c729a9da2b4a3c086eeb6abbb908ef9dfe08a3067064f5d4154fdf144baad27

  • SHA512

    bccfe68b82d301a9c41f5b2c29e1bb23be07df94181519a6837ab0c8c3fdeb97f7485919881694e3932081e345fe5b5299e9cfe8d576d236f755b225d9cc0c8f

  • SSDEEP

    12288:Sk9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/:dZ1xuVVjfFoynPaVBUR8f+kN10Ed

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

IYKE LOGS

C2

127.0.0.1:1604

Mutex

DC_MUTEX-U2T3MAJ

Attributes
  • gencode

    vb23itbmycw8

  • install

    false

  • offline_keylogger

    true

  • password

    raz@1234567890

  • persistence

    false

Targets

    • Target

      1632-71-0x0000000000400000-0x00000000004BA000-memory.dmp

    • Size

      744KB

    • MD5

      69f43aa455e7110e54dc0e8cf52870e4

    • SHA1

      a76f43ad17c361f3388f3ae8007e1be056f39661

    • SHA256

      0c729a9da2b4a3c086eeb6abbb908ef9dfe08a3067064f5d4154fdf144baad27

    • SHA512

      bccfe68b82d301a9c41f5b2c29e1bb23be07df94181519a6837ab0c8c3fdeb97f7485919881694e3932081e345fe5b5299e9cfe8d576d236f755b225d9cc0c8f

    • SSDEEP

      12288:Sk9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/:dZ1xuVVjfFoynPaVBUR8f+kN10Ed

    Score
    1/10

MITRE ATT&CK Matrix

Tasks