General
-
Target
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
-
Size
1.7MB
-
Sample
241129-mf1ewazqax
-
MD5
4a45eda053a2e6ca140a58d2dcba5ff0
-
SHA1
fa5bcdcb373d8dce86ae6bcc4ed4770ab4498b5d
-
SHA256
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11
-
SHA512
89fdba17a8750c85b3488492e1968a2ae7bc876552a558f84cd6ecee6582ee360112abe580fa0dab0005824f09695b4f8b114a4e2f09e12bad4f7030c14a416b
-
SSDEEP
49152:kOBuzw/nMVpcq/2ELfWum/+kD+MKklDvjao:kOuzwMobEKpDVKabjao
Static task
static1
Behavioral task
behavioral1
Sample
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
093012DE
hosting.servegame.com:8085
DC_MUTEX-NPS90EE
-
gencode
Sjl07Y5gccaE
-
install
false
-
offline_keylogger
true
-
password
Michemicalromance
-
persistence
false
Targets
-
-
Target
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
-
Size
1.7MB
-
MD5
4a45eda053a2e6ca140a58d2dcba5ff0
-
SHA1
fa5bcdcb373d8dce86ae6bcc4ed4770ab4498b5d
-
SHA256
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11
-
SHA512
89fdba17a8750c85b3488492e1968a2ae7bc876552a558f84cd6ecee6582ee360112abe580fa0dab0005824f09695b4f8b114a4e2f09e12bad4f7030c14a416b
-
SSDEEP
49152:kOBuzw/nMVpcq/2ELfWum/+kD+MKklDvjao:kOuzwMobEKpDVKabjao
-
Darkcomet family
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-