General
-
Target
JaffaCakes118_6d9bd1918b31a3fa429cc3d82377d560
-
Size
401KB
-
Sample
250103-stwlqstmdp
-
MD5
6d9bd1918b31a3fa429cc3d82377d560
-
SHA1
495114eb4c7c1e04b6013c653bf615158d67b353
-
SHA256
314855348585bf77c0474f74a5b42bb4976b16f7305a4fed007c612e046f9f43
-
SHA512
c0682fbae0a9beb32852de87d90299a0779ab44839883eeec65911e9bfb4adbf7e6e8f453768546fc84a69f54785a2a7e476fd662790de8bd3ef9c68c2ffa016
-
SSDEEP
6144:u0H64mYQHr09wpK+E/JvpAxuOC1RAp9jZ3synApEcML1NXC/lqjQ+NSE5FiAXL:stvpXE/sxu/1QjZziMLTXC9qk+NSE5xL
Static task
static1
Behavioral task
behavioral1
Sample
mono crypter.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
mono crypter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
phonex.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
hawbashmessi.no-ip.org:1604
DC_MUTEX-YUH2TWC
-
gencode
wdDMkYoQ5N1p
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
mono crypter.exe
-
Size
9KB
-
MD5
62c723973f715675df73fa05cbec054c
-
SHA1
1263be85fa87b17f54eb919d729dd1b7513b0e3e
-
SHA256
e7e4c97ceb46bc8b0964ee3979b8358b26de2e545a042b88e729e41574249074
-
SHA512
e73d38d2a421960d7d8b9ebd8685cf050b25931d2ad9fa25a56653a28bd8ed07e0ef6f0a9143b7f64633bd916ad98fddea1f99654871c4bf999543d6bba475d1
-
SSDEEP
96:8/L77IOY86NIHUCJgsb1Zap3hxZD8cE2+YlnlYJomLLGL0KfflwVEBiAj1TRXmmU:OL0L0UoZ83tDpVHnlYJ3KLTqVpCwVvI
Score3/10 -
-
-
Target
phonex.exe
-
Size
9KB
-
MD5
21157c4318cfd772a2d81e76a18205fc
-
SHA1
b5a62729a394113530ead2c87ac21493933e7686
-
SHA256
3f0ac34162f3c586de4344115e1f7465deb913d6b718485efc48a91d59f28a8d
-
SHA512
ed2a76cd16acb7880e90851d954ac46329b093db841bc8bb42fae213ae25da5ffb41d0e0d2ce962f3df76eb42901387c3231bb6d7158067b70ed3707c70bc2e4
-
SSDEEP
192:LL3AXeUgZ83tDpV4NnlYJ3nLTqVpb3vI:LLTVZ83FpS6XLTcI
-
Darkcomet family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-