General
-
Target
d63ee21497555543bca9f7ca589a8a3abb457f93ac459989457239578c0e47e7N
-
Size
1.8MB
-
Sample
241009-gdw2savaqq
-
MD5
43d4bbd88bab1a7c5dbfc1be066d1db0
-
SHA1
313736e454cf26dda3bedac4559d3860e41f251f
-
SHA256
d63ee21497555543bca9f7ca589a8a3abb457f93ac459989457239578c0e47e7
-
SHA512
3c3245426144ee6e9c19f2ade90d85ef58afea4c67f7867b560ae39326006d0334c1e697c7db89119dde969895d29baf944e38707bdffb89d930f52ecfc37869
-
SSDEEP
24576:76MyeXTLTlGMQzaWMWRIWxhWX4HQIOyJlwdVzwv/QSnyurl/XVtauuEq6:76MyeXTgM7+hDQMwdM4Snysl/ltau
Static task
static1
Behavioral task
behavioral1
Sample
d63ee21497555543bca9f7ca589a8a3abb457f93ac459989457239578c0e47e7N.exe
Resource
win7-20240704-en
Malware Config
Extracted
darkcomet
Guest16
6.tcp.ngrok.io:10522
DC_MUTEX-S6X11G9
-
gencode
w5jnrTqtlMtt
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
d63ee21497555543bca9f7ca589a8a3abb457f93ac459989457239578c0e47e7N
-
Size
1.8MB
-
MD5
43d4bbd88bab1a7c5dbfc1be066d1db0
-
SHA1
313736e454cf26dda3bedac4559d3860e41f251f
-
SHA256
d63ee21497555543bca9f7ca589a8a3abb457f93ac459989457239578c0e47e7
-
SHA512
3c3245426144ee6e9c19f2ade90d85ef58afea4c67f7867b560ae39326006d0334c1e697c7db89119dde969895d29baf944e38707bdffb89d930f52ecfc37869
-
SSDEEP
24576:76MyeXTLTlGMQzaWMWRIWxhWX4HQIOyJlwdVzwv/QSnyurl/XVtauuEq6:76MyeXTgM7+hDQMwdM4Snysl/ltau
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-