General
-
Target
RNSM00355.7z
-
Size
8.4MB
-
Sample
241107-1aeg4s1pfj
-
MD5
1e27240afe6f2292ebdda2f35af1379f
-
SHA1
f98cfd4bc31e3c07e90080df33022cb323822cf7
-
SHA256
984ce7df6ebb527fdf397217bf2879c72dc3acca8078e64dc002b86da548efbe
-
SHA512
e28ff232eb03d6e98503ec79bd1ad2d61a4b68f444cef0136c3ea104a1e25dba041334616355619e85b2279ab38b5a0650d67e917cee57d15ccc403787cec604
-
SSDEEP
196608:QRAB5GdPTtXNJT3khw37TBDJAUwpFbxPm9i5TZaGMbc:QRg0RT06rtttGFbxPmgTZcbc
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00355.7z
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
asftp.no-ip.org:1766
DC_MUTEX-TNB4ASC
-
InstallPath
c:\Program Files\Java Runtime\Java Updater.exe
-
gencode
XDxYlNLNS75r
-
install
true
-
offline_keylogger
true
-
password
52410
-
persistence
false
-
reg_key
Java
Extracted
C:\$Recycle.Bin\QSQZINPORQ-DECRYPT.txt
http://gandcrabmfe6mnef.onion/3559b22c8b3c4d7
Targets
-
-
Target
RNSM00355.7z
-
Size
8.4MB
-
MD5
1e27240afe6f2292ebdda2f35af1379f
-
SHA1
f98cfd4bc31e3c07e90080df33022cb323822cf7
-
SHA256
984ce7df6ebb527fdf397217bf2879c72dc3acca8078e64dc002b86da548efbe
-
SHA512
e28ff232eb03d6e98503ec79bd1ad2d61a4b68f444cef0136c3ea104a1e25dba041334616355619e85b2279ab38b5a0650d67e917cee57d15ccc403787cec604
-
SSDEEP
196608:QRAB5GdPTtXNJT3khw37TBDJAUwpFbxPm9i5TZaGMbc:QRg0RT06rtttGFbxPmgTZcbc
-
Darkcomet family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
Modiloader family
-
Contacts a large (16404) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
ModiLoader Second Stage
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2