General
-
Target
ac1f09d0a797d231ac40d98c74851efbb1325d8c6351ddc251e0369c2f20c0ac
-
Size
324KB
-
Sample
240423-cr2f7sbf8x
-
MD5
1da9d5eb17a25c1dcd2d7028867904aa
-
SHA1
b75ab89bcf8306b9ef6d222478a004aba32ecd7f
-
SHA256
ac1f09d0a797d231ac40d98c74851efbb1325d8c6351ddc251e0369c2f20c0ac
-
SHA512
68b49d817d381fdd4d108f9b86c8aeb4a743000247878412c30d671be78d9eb3c019db62a4cc61f207e556389b9b3ff012f1e4c77d822ea42132f6aa292a94d2
-
SSDEEP
6144:cvhFCYZdP5aHNn1s7C+3S4R5wQrV/YbZwZ3ssu4eqswN8s1Pf4NAGy5uRyXR6P+R:TQdwHNn1OCN4MQEZwUqsA
Static task
static1
Behavioral task
behavioral1
Sample
ac1f09d0a797d231ac40d98c74851efbb1325d8c6351ddc251e0369c2f20c0ac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac1f09d0a797d231ac40d98c74851efbb1325d8c6351ddc251e0369c2f20c0ac.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkcomet
Guest16
betclock.zapto.org:35000
DC_MUTEX-LCQCVNZ
-
gencode
MGDU5FhLNYez
-
install
false
-
offline_keylogger
true
-
password
0123456789
-
persistence
false
Targets
-
-
Target
ac1f09d0a797d231ac40d98c74851efbb1325d8c6351ddc251e0369c2f20c0ac
-
Size
324KB
-
MD5
1da9d5eb17a25c1dcd2d7028867904aa
-
SHA1
b75ab89bcf8306b9ef6d222478a004aba32ecd7f
-
SHA256
ac1f09d0a797d231ac40d98c74851efbb1325d8c6351ddc251e0369c2f20c0ac
-
SHA512
68b49d817d381fdd4d108f9b86c8aeb4a743000247878412c30d671be78d9eb3c019db62a4cc61f207e556389b9b3ff012f1e4c77d822ea42132f6aa292a94d2
-
SSDEEP
6144:cvhFCYZdP5aHNn1s7C+3S4R5wQrV/YbZwZ3ssu4eqswN8s1Pf4NAGy5uRyXR6P+R:TQdwHNn1OCN4MQEZwUqsA
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-