General
-
Target
4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381.exe
-
Size
282KB
-
Sample
250216-vkrmjatmcz
-
MD5
38a67b2fa87a6d49c5fed725ef7cc3e6
-
SHA1
49b608056a135553bb06046e5bd03d118661648a
-
SHA256
4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381
-
SHA512
9daac628212a599ab53e711b2bebc53d32c72cf6d21e5fc106e3898fdc4ed3693fca4dee0dac1b1352ccb359fafde2d76f4590f250ef65821ea4ab60b2687da6
-
SSDEEP
6144:Q7DuIRToyeNNkwLq/oCjEqfZgDQJa342ERAiU8AIHHA+K:kTo1ZqfjEGZiMRAiU+HAT
Static task
static1
Behavioral task
behavioral1
Sample
4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381.exe
Resource
win7-20250207-en
Malware Config
Extracted
darkcomet
RS
hoszelaar.no-ip.org:10101
DC_MUTEX-X4K5D3S
-
gencode
NKcVDHlXwyol
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381.exe
-
Size
282KB
-
MD5
38a67b2fa87a6d49c5fed725ef7cc3e6
-
SHA1
49b608056a135553bb06046e5bd03d118661648a
-
SHA256
4cd3d8089e8022eff724e28c0f389b20a921cb500f0d193d74f5cc97ad0d3381
-
SHA512
9daac628212a599ab53e711b2bebc53d32c72cf6d21e5fc106e3898fdc4ed3693fca4dee0dac1b1352ccb359fafde2d76f4590f250ef65821ea4ab60b2687da6
-
SSDEEP
6144:Q7DuIRToyeNNkwLq/oCjEqfZgDQJa342ERAiU8AIHHA+K:kTo1ZqfjEGZiMRAiU+HAT
-
Darkcomet family
-
Downloads MZ/PE file
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-