General
-
Target
98d40e12110f61c5c40754fb5d15bceb_JaffaCakes118
-
Size
263KB
-
Sample
241125-dk2n3avpaw
-
MD5
98d40e12110f61c5c40754fb5d15bceb
-
SHA1
7ed300100cf582482a297d92c54d9bf3b3ab9ba1
-
SHA256
b918d3de5c87e80f6dd7cb945bece30325b7700fed75c32081753c5894d1919e
-
SHA512
b476b19aaa8b9f17cecad4f8a48d6808d122db7c2c43c4a9357041307231a160178f96d994343367ae522acef81b84bce46ef2d38fe7c655a64ed5f77b1bb16a
-
SSDEEP
6144:SamZcalIRPnhbNj9OhqnZIOl2GWj5WbwezOCocbu:2ZcaCphGIZIOcGWjsvOC0
Behavioral task
behavioral1
Sample
VKBOT.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
mrhomer228.ddns.net:1606
DC_MUTEX-FKPEL23
-
InstallPath
windownsys.exe
-
gencode
HsrmtxZDk9Q9
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
windownsys.exe
Targets
-
-
Target
VKBOT.exe
-
Size
658KB
-
MD5
e1013f580361131d2d983a866c14f68f
-
SHA1
fe0bca3bd6b437b551bc623a11d0e4ce92c095dc
-
SHA256
6a8ecebda423b2979e92809e8567861480e9ec06422eec0399746e06275214cc
-
SHA512
1749a583805d3d784bfa63f0d82f936ecd320ff5d3ba10146f0530b63ad976908629226bc81e7e7071d71a956f7c4278b85ff3a240bc9d7c089678c3fe4e54f5
-
SSDEEP
12288:S9HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyFd:+iBIGkbxqEcjsWiDxguehC2SG
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7