General
-
Target
DarkNight.exe
-
Size
3.9MB
-
Sample
240415-3gbe5sdb9x
-
MD5
d396e70e3da1b5c0c8414a524971b83e
-
SHA1
928fcd454a00ec2141fa0b1966ae509235c4c6c7
-
SHA256
b8022c1aa5f5f6220ffce8f3f473bb8078bbf171fa00e50823bc0c79946c1121
-
SHA512
dd66a02df8456876b89fc913d4e0e3c60324cb4adb4dd4c3a39babf0a70a6f4f10eb9d610a6aa86576746e5d9e458c85fbc320b708949a164c43588c9aaf9d4b
-
SSDEEP
98304:8O6Dchp3YEtEbfY514GcOIjRy9NcrMcLAAW8bapEUyB3pm1:8OakRObogOdDcNL08ILyu
Behavioral task
behavioral1
Sample
DarkNight.exe
Resource
win7-20240221-en
Malware Config
Extracted
darkcomet
DN2
80.93.220.228:1605
DC_MUTEX-X39FPQJ
-
gencode
UxJtmrp9botj
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
DarkNight.exe
-
Size
3.9MB
-
MD5
d396e70e3da1b5c0c8414a524971b83e
-
SHA1
928fcd454a00ec2141fa0b1966ae509235c4c6c7
-
SHA256
b8022c1aa5f5f6220ffce8f3f473bb8078bbf171fa00e50823bc0c79946c1121
-
SHA512
dd66a02df8456876b89fc913d4e0e3c60324cb4adb4dd4c3a39babf0a70a6f4f10eb9d610a6aa86576746e5d9e458c85fbc320b708949a164c43588c9aaf9d4b
-
SSDEEP
98304:8O6Dchp3YEtEbfY514GcOIjRy9NcrMcLAAW8bapEUyB3pm1:8OakRObogOdDcNL08ILyu
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-