General
-
Target
3a55d91e61af1c290a7a68331dcac7f5f21eb103705404ed7af0cdc5821782d0
-
Size
520KB
-
Sample
240508-1dv92aba74
-
MD5
d7206a37e24eb76093ea060e432d2c7b
-
SHA1
4bac2b9c8291a4f34f10a7784319229d6014c059
-
SHA256
3a55d91e61af1c290a7a68331dcac7f5f21eb103705404ed7af0cdc5821782d0
-
SHA512
acd7df22fa7bdd819449e4a236b3228930300fc9a4325897dceb3400022ab5f20688585d5766de6601d202dbee3e5320d01a9b80d1c7005111d002304d3bd2eb
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbo:f9fC3hh29Ya77A90aFtDfT5IMbo
Static task
static1
Behavioral task
behavioral1
Sample
3a55d91e61af1c290a7a68331dcac7f5f21eb103705404ed7af0cdc5821782d0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a55d91e61af1c290a7a68331dcac7f5f21eb103705404ed7af0cdc5821782d0.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
3a55d91e61af1c290a7a68331dcac7f5f21eb103705404ed7af0cdc5821782d0
-
Size
520KB
-
MD5
d7206a37e24eb76093ea060e432d2c7b
-
SHA1
4bac2b9c8291a4f34f10a7784319229d6014c059
-
SHA256
3a55d91e61af1c290a7a68331dcac7f5f21eb103705404ed7af0cdc5821782d0
-
SHA512
acd7df22fa7bdd819449e4a236b3228930300fc9a4325897dceb3400022ab5f20688585d5766de6601d202dbee3e5320d01a9b80d1c7005111d002304d3bd2eb
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbo:f9fC3hh29Ya77A90aFtDfT5IMbo
Score10/10-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-