General
-
Target
JaffaCakes118_ece51a428d92445574c55ee55a0d6084
-
Size
320KB
-
Sample
250212-ef2nyaykgj
-
MD5
ece51a428d92445574c55ee55a0d6084
-
SHA1
5e8b66616465f4cdddddeda2765bea1b60f1f7f4
-
SHA256
e5e7c726a5de079b2c83db2ac5ff201d8472ac2df9be70c961984246a22755da
-
SHA512
95b6be7eca1717df16943c37821b65ee8a68747374833e18e2b4456e473162b57799a17f218549ee3feea98d0c05c81cf15b4f2f25aeacc079dcff5881b6076a
-
SSDEEP
6144:6G78BQfU3w0E5oRPa3ZF1nTqpjFoXpxHT1fLl7UErm1vz/e/GTU6:B78B/32CPAnTAoX3xBS46
Behavioral task
behavioral1
Sample
Point Blank NG.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Point Blank NG.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
darkcomet
Kurban
cruee.no-ip.biz:6300
127.0.0.1:6300
DC_MUTEX-72WLYVD
-
InstallPath
MSDCSC\svchost.exe
-
gencode
ohR9oxZlMZ8r
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
Point Blank NG.exe
-
Size
663KB
-
MD5
cef378af5fdeba7f7a77435b75a75566
-
SHA1
1301bb0c40a78f384a1586adf5275e0835728e48
-
SHA256
452125999dfaaf54ce021efa0b70281ae3cb2592d55f7e5a4c8ede94aabcf85f
-
SHA512
fa05795f175d4c48cbc77f1d26ddb67059602fa382f09876a090fd79e0e77c615771291f214c2122448ae7e7b635dd344345adf81e11e7ddb5d8521338a5da84
-
SSDEEP
12288:u9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hq:6Z1xuVVjfFoynPaVBUR8f+kN10EBs
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7