Behavioral task
behavioral1
Sample
1632-71-0x0000000000400000-0x00000000004BA000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1632-71-0x0000000000400000-0x00000000004BA000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1632-71-0x0000000000400000-0x00000000004BA000-memory.dmp
-
Size
744KB
-
MD5
69f43aa455e7110e54dc0e8cf52870e4
-
SHA1
a76f43ad17c361f3388f3ae8007e1be056f39661
-
SHA256
0c729a9da2b4a3c086eeb6abbb908ef9dfe08a3067064f5d4154fdf144baad27
-
SHA512
bccfe68b82d301a9c41f5b2c29e1bb23be07df94181519a6837ab0c8c3fdeb97f7485919881694e3932081e345fe5b5299e9cfe8d576d236f755b225d9cc0c8f
-
SSDEEP
12288:Sk9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/:dZ1xuVVjfFoynPaVBUR8f+kN10Ed
Malware Config
Extracted
darkcomet
IYKE LOGS
127.0.0.1:1604
DC_MUTEX-U2T3MAJ
-
gencode
vb23itbmycw8
-
install
false
-
offline_keylogger
true
-
password
raz@1234567890
-
persistence
false
Signatures
Files
-
1632-71-0x0000000000400000-0x00000000004BA000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 476KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 246KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE