General
-
Target
Handler.exe
-
Size
253KB
-
Sample
241110-j5lq8stbkf
-
MD5
9877f2250a1b6f72beedd0cf71b90a6c
-
SHA1
c8e179559e1d7839ff1078b0685b798ecfc0f8f2
-
SHA256
19f4bb3e5785aa78e2e97d59b93fa396636d1d6c9eff94ea8dee21c0b55e2c45
-
SHA512
a1c65f2c0568444f9e5f2f119810c7d4ca3dbd7b1673edd5235e7be4a316e929c608f2e441860da909d1c120c20b5cab44d6bacaa4db076c0b30f5c832936979
-
SSDEEP
6144:mD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZt:ml8E4w5huat7UovONzbXwp
Behavioral task
behavioral1
Sample
Handler.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
interface-alternate.gl.at.ply.gg:54125
DC_MUTEX-VPRU4P1
-
InstallPath
Bloxstrap\Errorhandler.exe
-
gencode
gEP7RRzUsNHB
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
Handler.exe
-
Size
253KB
-
MD5
9877f2250a1b6f72beedd0cf71b90a6c
-
SHA1
c8e179559e1d7839ff1078b0685b798ecfc0f8f2
-
SHA256
19f4bb3e5785aa78e2e97d59b93fa396636d1d6c9eff94ea8dee21c0b55e2c45
-
SHA512
a1c65f2c0568444f9e5f2f119810c7d4ca3dbd7b1673edd5235e7be4a316e929c608f2e441860da909d1c120c20b5cab44d6bacaa4db076c0b30f5c832936979
-
SSDEEP
6144:mD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZt:ml8E4w5huat7UovONzbXwp
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1