General
-
Target
762b3d81f75bb34d58a6e5d84e5d0a62c8d1d80682864b5aa2179ebcd7ba2f4a
-
Size
520KB
-
Sample
240413-2aadtsaf74
-
MD5
d8bd31822b9fe52e87455a51bc1984d4
-
SHA1
9b0b0738d9165551e3804c8611a13f5bc358ccc3
-
SHA256
762b3d81f75bb34d58a6e5d84e5d0a62c8d1d80682864b5aa2179ebcd7ba2f4a
-
SHA512
05525bda9c0bf4f50c6bd743706e7b41a385d47f1c386e05a87f36bead0e07f3744d60a229520ef6d3be27a4a96493db17adb8c44010cb7ce529a1d94aea2700
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbk:f9fC3hh29Ya77A90aFtDfT5IMbk
Static task
static1
Behavioral task
behavioral1
Sample
762b3d81f75bb34d58a6e5d84e5d0a62c8d1d80682864b5aa2179ebcd7ba2f4a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
762b3d81f75bb34d58a6e5d84e5d0a62c8d1d80682864b5aa2179ebcd7ba2f4a.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
762b3d81f75bb34d58a6e5d84e5d0a62c8d1d80682864b5aa2179ebcd7ba2f4a
-
Size
520KB
-
MD5
d8bd31822b9fe52e87455a51bc1984d4
-
SHA1
9b0b0738d9165551e3804c8611a13f5bc358ccc3
-
SHA256
762b3d81f75bb34d58a6e5d84e5d0a62c8d1d80682864b5aa2179ebcd7ba2f4a
-
SHA512
05525bda9c0bf4f50c6bd743706e7b41a385d47f1c386e05a87f36bead0e07f3744d60a229520ef6d3be27a4a96493db17adb8c44010cb7ce529a1d94aea2700
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbk:f9fC3hh29Ya77A90aFtDfT5IMbk
Score10/10-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-