Overview
overview
10Static
static
1100.exe
windows7-x64
8100.exe
windows10-2004-x64
10101.exe
windows7-x64
1101.exe
windows10-2004-x64
1102.exe
windows7-x64
8102.exe
windows10-2004-x64
5103.exe
windows7-x64
8103.exe
windows10-2004-x64
1105.exe
windows7-x64
10105.exe
windows10-2004-x64
10106.exe
windows7-x64
8106.exe
windows10-2004-x64
1107.exe
windows7-x64
6107.exe
windows10-2004-x64
6108.exe
windows7-x64
10108.exe
windows10-2004-x64
10109.exe
windows7-x64
10109.exe
windows10-2004-x64
5110.exe
windows7-x64
10110.exe
windows10-2004-x64
10111.exe
windows7-x64
10111.exe
windows10-2004-x64
10112.exe
windows7-x64
8112.exe
windows10-2004-x64
7113.exe
windows7-x64
10113.exe
windows10-2004-x64
10114.exe
windows7-x64
10114.exe
windows10-2004-x64
8115.exe
windows7-x64
10115.exe
windows10-2004-x64
10116.exe
windows7-x64
8116.exe
windows10-2004-x64
7General
-
Target
daa8802270996f3d7b4835fd9fba42da054ad1a58403854c0f86b0666c631ac1
-
Size
7.8MB
-
Sample
221126-nka68aea9w
-
MD5
15c9302b597a21decd793f051c9e0667
-
SHA1
979368729f869c63cc4cd8af69e7340a60e960e3
-
SHA256
daa8802270996f3d7b4835fd9fba42da054ad1a58403854c0f86b0666c631ac1
-
SHA512
d8035e55fcf7774b63132c1283578596c001aa01caf91189279598a6fdb5e6c638d97180da574fb3638b4fad43460ce94c6869b158573cab1b5092f29f52a921
-
SSDEEP
196608:K29rzNZVQvkHBjuL9RR5haywWKCkAyXWMCiP:KezNZVvH49RR5wbWKzn/Ck
Static task
static1
Behavioral task
behavioral1
Sample
100.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
100.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
101.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
101.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
102.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
102.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
103.exe
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
103.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
105.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
105.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
106.exe
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
106.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
107.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
107.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
108.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
108.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
109.exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
109.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral19
Sample
110.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
110.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
111.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
111.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
112.exe
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
112.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
113.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
113.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
114.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
114.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
115.exe
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
115.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
116.exe
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
116.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
darkcomet
MTCN
darkcomet.jumpingcrab.com:222
DCMIN_MUTEX-PBF9KT3
-
gencode
rTqGpqgXdwrj
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
pony
http://exportservices.co.in/david/Panel/gate.php
http://www.warlordsltd.in/wordpress/wp-admin/css/colors/fox/panel/gate.php
-
payload_url
http://exportservices.co.in/david/Panel/shit.exe
Targets
-
-
Target
100.exe
-
Size
75KB
-
MD5
6fe5189a35abb1d99830e92de024bd2d
-
SHA1
add93a5ad62ff4d923f68661727ea0c37d2053fd
-
SHA256
9e3ad5186e3784d866a3ed9a41e61a1ff2fbb983ce8edb330a3b069f452b636d
-
SHA512
7f28b95a47947f75c10763dec5a22fc77b9d249144e24c8de8824dba0dc375729f1b8a4e4aa9faeb3031ee11d1e38afbc167904f5a5061390d896673b414950c
-
SSDEEP
768:tbyvTDdVf5ozWBYP5SywTwiN9dguJcF4Qhc4VjsS8jAnKNu6LUEscg6U2:tbyvtVRsWyP55wTwiT2hBjsV61nV2
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
101.exe
-
Size
382KB
-
MD5
ddfd1af9b3efa75c2fd43345ad6d5134
-
SHA1
d4c4b94b065730cfedbb4b1d4028334c0249cc16
-
SHA256
816f2804fa18c61299f99044fe9dac032cc41a14fbc2b9240906125dd3851e0f
-
SHA512
28aeabaaa5f9ecff771dd302314da94b0c9cd945bfde34873f172cf801bbc94f3a12f5ed5ed8d62b0707a9f22fb88c12bca0e19a08f3b2ba2f5b65a3aa635066
-
SSDEEP
1536:Ut/vpQmpV3t/vpQmpVBIzK66cqFz5CCImpEzqG4SutULWKh83TCBkryYRCO2/7ed:QnpVpVdnpVpVB+8BICbrq
Score1/10 -
-
-
Target
102.exe
-
Size
296KB
-
MD5
53dbea2d9cbdaa8271d05eb5dbb26cd6
-
SHA1
e991722d8f9d739f8a3adaf70cd8c3c905ce995f
-
SHA256
810d0d8097c08297f9ddbba9d513ea75ec3cc50ca2f82c7985e148b191ad5a05
-
SHA512
617c7df31822baf436c88b3d5698b573fcc49f20332b209d134caee682620520fd91b55f671ddfbb857eae212bcf10dfd93438cd648477d43f9cbbe9fcc41fa1
-
SSDEEP
6144:uVI/y3qx3YgnXIqE8LsUCSLdgR4XbMg65AGdU:hKaxYgYqEssdSGyrMBQ
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
103.exe
-
Size
1.3MB
-
MD5
d28a03f60138fdfe9184420a6b01d1bb
-
SHA1
ecd63362ccff42b702491512f1bc3201ed6992a9
-
SHA256
815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35
-
SHA512
18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46
-
SSDEEP
24576:6NQmE25Zq4qCN3yQtEOzFxa1LBUYrFgzxzFSO2KDAXiW6Bo:6NQsqc5tza8P0TKi
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
105.exe
-
Size
555KB
-
MD5
6494681c2245762c201fb9d0168a400f
-
SHA1
eaf39ecfb2648ac66f8e60bf63558f3d72fd9928
-
SHA256
e9904b7bcc2f754d895f293be21430c96f8278a449f48a346cf68036782dbfbb
-
SHA512
7e63b20e05fb894757505e99db8e43927e98bb5bcd0f84a5e035187536fedda5f5441711c5e22168fe59dbe5224cd7acf7836cb1e65a4dfd4b38e95dd8fce62c
-
SSDEEP
12288:9rI128T22OA9bwbz8elTAOJlB1CrbFFXi:Vr8T2iJwbz80MOzurbfS
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
106.exe
-
Size
332KB
-
MD5
67abb102366bd7c06300496c3d630936
-
SHA1
718c01cea0371b44fd086903065202961c8835fe
-
SHA256
683e8a62cbd58fbf1b0fff4a232d953768b50edf484c42bda1bdab5a4291d662
-
SHA512
ee85cbce1b91fae3aa757c771d558997c4a6e41c12b623261d8ec4ea9c1df10d8318be73617f0b5125f21b88522616cc258991b6b700a5eddb7263442f1613fa
-
SSDEEP
3072:+yNx6ONRoVtNChz/3VqDd3+YKYkbrtFVCZODEBcGnsgq/fTQdHYivQZ6g3/s3PMB:HNxjeN8/4kYkoL
Score8/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
107.exe
-
Size
8KB
-
MD5
339e4181fe7c160461c885faf5e6fd14
-
SHA1
b90c1adb7483723b177aca3e423119f5c3803a11
-
SHA256
403a36221ba0f7f94c0fd180058d033215ec3a0cbbd9cf18dc573ca312dae3a6
-
SHA512
e3adf3a194b7a7d02b64a0f1e0b5c5315d02f6f501c77cc07a97d5a4a24f200bba5d5080d5205fe8ff6a59e282e0f3946410e548c09f54e0ce277b078d8df662
-
SSDEEP
96:q2Imfd/26jgx0G60G9kSfkYGol8NDOFs8yoGvhUko9+r5M/24q9eRY0bqOi:q4fdSxK0akSTV4LhNo9w2awOO
Score6/10-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
108.exe
-
Size
1.5MB
-
MD5
10d88208d6fc2e26cb4eed0397dab235
-
SHA1
7f008ecd348766769d024c8c85dbf9c6a46f4833
-
SHA256
0f4ecea31c8a309dc0c26d4cdddc38f0aaf307399a4705df82088b38553901eb
-
SHA512
80c9e1403860884e5e361c1ecbb95335636924d1897794078ff0286abb900dc040c3441a7ab5f1ce475b32c22a5ebf03ea4235be2c6db4ab6a5fd601cd38cc05
-
SSDEEP
24576:vOFgW1J2afML80j0YLKh45y/nsfkNzUOtS0i3lPb0KIEEFNPaNETiLb+J2vs9:vD022+90Dn/Ukw0iVTPEF9LiVE
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
109.exe
-
Size
1.5MB
-
MD5
48b5f870cd52e63adff35391961974b5
-
SHA1
b355a7ea90387606c41b9641c9c7857250335ed9
-
SHA256
7a84c0090ef3aa1210ff677298007ab3c6a626b047473f6f4854955cd4e0213f
-
SHA512
a3245fcfc944514a0a28e9e0887eeba7b971fdc2a7c5168e4b3311f38a2bdc2692800fc7e42e64938e7ec91b9f4dcdb57f77d33f5dcc2e36e8590c065e2f698f
-
SSDEEP
24576:w6LGRV7EMd5A5/B81TJvWkw1RaksEloH6KWUIuYYTcrL7VF3JOkK74gYx:w6qRV7EMd5A561TKTPTsW8A34NYx
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
110.exe
-
Size
242KB
-
MD5
c0224c4d9628b324db1af4d9007fa46c
-
SHA1
1d264386f3d36b28f78f3cba45c189e0c065ce16
-
SHA256
673a680f2bad58c131f64dcf538e9e4539ea5b5319020ce27d05baffe9ea0984
-
SHA512
339492a6de4aa920db03f8e4cff3e76052372096f068d4d5984ffc7fc93d15423ee4a35b24f583a2edb67658e7411d9789fe4024223c27015fe8f555407bbe03
-
SSDEEP
3072:5hmeYAv6OUGsjtZfSPAnk2eFkf2zXm5XHxXQ41lfmLjCsyQQHX0LTvNaJS7X9hkg:JYAUGs/fSPAkDFKXJHQgENaU7X9h
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
111.exe
-
Size
346KB
-
MD5
7eb1dab5352b08d22f9bc9adff2fe769
-
SHA1
3b7d70bd225c687a86481ca1fad6a9979c02b512
-
SHA256
31451031271efb07c67bf5a6864471ffc092f16e63aac290a49bdb86f6e47fd8
-
SHA512
55120acc9c744d13e42907ea6da1a8b7572c30c7f40d384dd40060fab3a6c72144ee723284b0201bb98a1ef96620436666fd67415b432c2013dc976d83697d51
-
SSDEEP
6144:aIsmmCy886hKGj1FzwVOHpLJPpRlYcgy8uuaaAiUDVoL0XYcYhUMdcL77s3QpjKv:KN8jhUsHpLPFl8uuaaloMdl
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
112.exe
-
Size
187KB
-
MD5
1b16b152c1fde08b8089adf6132f5d4d
-
SHA1
025f3f3760221f62415376ac2ecb6bd8d426762e
-
SHA256
1fc0ea9775d1a71a08af06b83e829664b19a9122ce0dfececfc205aa72fcbc44
-
SHA512
7af997e7b9daa383f6956d9c267ae14d83c223a625a47d5c5c7b9a1391c04332f4315d0ae314d2ab7ea1648c9db2d3b60251e431d288909dd9f31ce8cddaff4e
-
SSDEEP
3072:EDQkrZoosbIfXJMq6WLs0JiG3VU2wBOZfYyqUElu/UvymUPPGwuDjwauVxrITZFE:EDpoeCOLNHFU2COZfYyTElu86mpFwa6/
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
113.exe
-
Size
721KB
-
MD5
dcf4149718fb8d5a31976034452cb574
-
SHA1
aef9286d24812051ebca0188a8c4dbaa833a6e3d
-
SHA256
8aaace67e12ccd71bf30a3b844a81738860dde289f48ee41e61a42bc5797bf25
-
SHA512
82d4c6c469bc75f9b11cffc7b8d71c262aeb4138162562b3dc3ddc8a5bcd256a51e0171f4f8b6e3e486e391a8c32ecfaf63c0bbef639d83ca806772bd4f48f9c
-
SSDEEP
12288:U5OnerWhEgD3H08lJDftfNtsj4MNNtCYzsjgdXWYPPm6TWSvCrXIsB3BnqBzsTdN:UInN5k8lX/u4MNNInmjYIkBqzzAuN7st
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
114.exe
-
Size
928KB
-
MD5
1a3e186988e76f505a858eb30d77fa72
-
SHA1
c9a8f4429f588f2332b2e61bbdd67bbe7b9128c3
-
SHA256
d40a88423f47facdc46b66e7250866c8280b53733c1e366a077e8925aaa71953
-
SHA512
7fe896b8f7a1e5f091ed5f19a559adb5a29b4bc703cfa161adafe73cd71bdf18cf438c0c46bc96187288727dbc45e337fa8b14d1b80b7deef9a964df82d85ce3
-
SSDEEP
12288:x5OEfJo1mJxRHHE6mRsc9gC8NLhPtD6IA1x2eU8iacTSUvpvEIF8BQa7zPPm6TW4:xIEfJYOWQb8uTSURpF2NYIkBqzzKuN7v
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
115.exe
-
Size
1.4MB
-
MD5
ee42fadf6ff3380c26ba01b39d058e97
-
SHA1
21789b55de06541a26b155317b26df95ccea8c58
-
SHA256
b50c4330815418eaea6ba905f14ef10815cd3092397802333768ac8e7a71bc74
-
SHA512
8ab435860d81f3140263a3dcb7fec4ca0d7b3e5484e3f2d51cc64336ee6754fad077642deb5244dd41e486aac78d9cc5c7645857108bfceabff5a29550a6499d
-
SSDEEP
24576:Dq3jE25Zq4qCN3yQtEOzFxa1LBUYrFgzxzFSO2KDAXiW6BQ:4Fqc5tza8P0TKS
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
116.exe
-
Size
475KB
-
MD5
5693b49732f95de6062b19b6aea6d5b5
-
SHA1
fe2266c677a09e28fb86016331371976c133e7fd
-
SHA256
30ac74e39be0cf57579fbffbda9138386b2eefd45eac6df28da251d43a0d3d42
-
SHA512
fa7cb7f97b728322280a652d2f49735bf49daf47f5af6d50789c95d53979971255774bbadcf03a32e481dac17ec5e4905ab0221658f47ffdc12bc1a0727b80db
-
SSDEEP
6144:1DpoeHt8QJCUN0C7Py1av5oam+vqFvmkHf3HZHLhSk2cKgL:ZtVTN0C7PyktXVVk2cbL
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Winlogon Helper DLL
1Defense Evasion
Install Root Certificate
1Modify Registry
5Scripting
1Web Service
1