General
-
Target
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4
-
Size
642KB
-
Sample
250325-1nby5swqz6
-
MD5
ca6c591a7ae42873de9f0f512107e693
-
SHA1
e572562e39c39154b46821df84d4750034f61a81
-
SHA256
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4
-
SHA512
76e46e04b0489aefd11ccfa7e263c56ace00bb1b139de64f878cc8e0e75b3096be0715028ae888fe0896378238e31d6d71c8757aeba5caa625924acd191f51c0
-
SSDEEP
12288:XwLf1o3E5LNco0u9nrFXAjqOKl0aDcoOvB2tdGH4sm+omaeZ:XQdo0g3utujqpXDcoOmdGH4sm1ma
Static task
static1
Behavioral task
behavioral1
Sample
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Guest16
ariesdevil2.no-ip.org:1604
DC_MUTEX-2ZKGCGV
-
gencode
gePxyhGT8qXk
-
install
false
-
offline_keylogger
true
-
password
0123456789
-
persistence
false
Targets
-
-
Target
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4
-
Size
642KB
-
MD5
ca6c591a7ae42873de9f0f512107e693
-
SHA1
e572562e39c39154b46821df84d4750034f61a81
-
SHA256
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4
-
SHA512
76e46e04b0489aefd11ccfa7e263c56ace00bb1b139de64f878cc8e0e75b3096be0715028ae888fe0896378238e31d6d71c8757aeba5caa625924acd191f51c0
-
SSDEEP
12288:XwLf1o3E5LNco0u9nrFXAjqOKl0aDcoOvB2tdGH4sm+omaeZ:XQdo0g3utujqpXDcoOmdGH4sm1ma
-
Darkcomet family
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-