General
-
Target
d96562f7d3a110ce92b736f59a64cbbedf642ed90a4dbb19c184bee24dc03247_JC.exe
-
Size
7MB
-
Sample
230915-qt3c6sca91
-
MD5
853defebfd1baa98efa066bf34e41654
-
SHA1
6ad427cb53ee1f46ead7a8943a53e304ef3c21f6
-
SHA256
d96562f7d3a110ce92b736f59a64cbbedf642ed90a4dbb19c184bee24dc03247
-
SHA512
e52968c89ac06394c73d6d14bbd7ed09a90a0721e4c6b0794ce519177263771c9a276ddff7f1ec97140684d01ebe1a19d66eb50c9baf864b6f27d61cc6c31fc8
-
SSDEEP
196608:VUUIZYB12sG5/oKZu12ebfpnj1DD2IrAN8dnXIskK:OUzE/hDenRD1ANAnXIg
Static task
static1
Behavioral task
behavioral1
Sample
d96562f7d3a110ce92b736f59a64cbbedf642ed90a4dbb19c184bee24dc03247_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d96562f7d3a110ce92b736f59a64cbbedf642ed90a4dbb19c184bee24dc03247_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: ftp- Host:
193.149.189.199 - Port:
21 - Username:
ins - Password:
installer
Extracted
darkcomet
Guest16
140.82.20.165:1680
DC_MUTEX-F54S21D
-
gencode
6r3JcRAx4sF0
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
d96562f7d3a110ce92b736f59a64cbbedf642ed90a4dbb19c184bee24dc03247_JC.exe
-
Size
7MB
-
MD5
853defebfd1baa98efa066bf34e41654
-
SHA1
6ad427cb53ee1f46ead7a8943a53e304ef3c21f6
-
SHA256
d96562f7d3a110ce92b736f59a64cbbedf642ed90a4dbb19c184bee24dc03247
-
SHA512
e52968c89ac06394c73d6d14bbd7ed09a90a0721e4c6b0794ce519177263771c9a276ddff7f1ec97140684d01ebe1a19d66eb50c9baf864b6f27d61cc6c31fc8
-
SSDEEP
196608:VUUIZYB12sG5/oKZu12ebfpnj1DD2IrAN8dnXIskK:OUzE/hDenRD1ANAnXIg
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-