General
-
Target
9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564.exe
-
Size
1.7MB
-
Sample
250112-gpr7za1qhl
-
MD5
42569d9b139c0093fa393444dfbea52e
-
SHA1
0f661a3a1b6b9c728e8949d14db45af6e4f0d103
-
SHA256
9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564
-
SHA512
a88369d7bacea297de1c5a6c9a795624d5d0c0a7a883d86c38919824bf97dcbd847f53aa411ab9e8ff82ead72b918f5c5e014dd0b1db9ee8f1b63bb69d267ee3
-
SSDEEP
49152:7JZoQrbTFZY1iaCfnJxpCJOj6ToF1QtrOr10Z/GX:7trbTA1G4OeU4tk0ZOX
Static task
static1
Behavioral task
behavioral1
Sample
9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Snake-5
kasavetia.no-ip.biz:12321
kasavetia.no-ip.biz:45654
eu3.no-ip.biz:45654
eu3.no-ip.biz:12321
snake
-
gencode
Pi2UsWcM3BhH
-
install
false
-
offline_keylogger
true
-
password
Myhacker123
-
persistence
false
Targets
-
-
Target
9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564.exe
-
Size
1.7MB
-
MD5
42569d9b139c0093fa393444dfbea52e
-
SHA1
0f661a3a1b6b9c728e8949d14db45af6e4f0d103
-
SHA256
9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564
-
SHA512
a88369d7bacea297de1c5a6c9a795624d5d0c0a7a883d86c38919824bf97dcbd847f53aa411ab9e8ff82ead72b918f5c5e014dd0b1db9ee8f1b63bb69d267ee3
-
SSDEEP
49152:7JZoQrbTFZY1iaCfnJxpCJOj6ToF1QtrOr10Z/GX:7trbTA1G4OeU4tk0ZOX
-
Darkcomet family
-
Modifies visiblity of hidden/system files in Explorer
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2