General
-
Target
gay.vmp.exe
-
Size
5.4MB
-
Sample
250224-nyqtts1jv4
-
MD5
2d1fd41cbc1769d934cb3093e6f8063a
-
SHA1
72de3c4a9969415fcd973e6d9a4b0b19d892f4f2
-
SHA256
88d4d2554bb064ad0db74fd3fb97bff1325dbe751e4d21bda0ffc3d0bf5e3cd2
-
SHA512
636a62e8ee870bd6b076961f4d97db7eb8a3ece57d60cfbe2a65a0ece084d9157b8c985fba014d1dbfbc7d2bcebecdc58f9cbc9e1f8ca0c3a6c5592a8e7f23f5
-
SSDEEP
98304:2l2uqawox97EzdtHtaU6ZJi0RueilG11U0xDYxFUPFUJh610:2l2uqawESdtHtt6Z9Y811UX+P5C
Behavioral task
behavioral1
Sample
gay.vmp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
gay.vmp.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
gay.vmp.exe
-
Size
5.4MB
-
MD5
2d1fd41cbc1769d934cb3093e6f8063a
-
SHA1
72de3c4a9969415fcd973e6d9a4b0b19d892f4f2
-
SHA256
88d4d2554bb064ad0db74fd3fb97bff1325dbe751e4d21bda0ffc3d0bf5e3cd2
-
SHA512
636a62e8ee870bd6b076961f4d97db7eb8a3ece57d60cfbe2a65a0ece084d9157b8c985fba014d1dbfbc7d2bcebecdc58f9cbc9e1f8ca0c3a6c5592a8e7f23f5
-
SSDEEP
98304:2l2uqawox97EzdtHtaU6ZJi0RueilG11U0xDYxFUPFUJh610:2l2uqawESdtHtt6Z9Y811UX+P5C
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2