General
-
Target
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe
-
Size
42.2MB
-
Sample
250311-txd2jayygs
-
MD5
357b5f06e0a084f8c37e6a38afa29c76
-
SHA1
e7de8b81872b571e9e0fe6dcc48c94dfe8d50318
-
SHA256
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528
-
SHA512
ab539349cb46cdf4c2ce48569a123abc9634adebe68e0ccd19c89f008692651deb727892c1476796d0229965ed25d96b73735ce9ab86fad2bf67abd65ae9cd36
-
SSDEEP
786432:M129ofpkXbsydPnpeWjrqBqe4k51vJ8EhsI14StdNoIvTe3HzuREJgIkH5:Y29AwsydPnpXqBq4pmEhh4Sj9Te3TGEk
Static task
static1
Behavioral task
behavioral1
Sample
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
pony
http://www.orway.bplaced.net/pony/gate.php
http://www.socialnetwork-toolbase.de/ucs/pny/gate.php
http://btcminer.ddns.net/pony/gate.php
Extracted
darkcomet
SPREADDDD
852000.ddns.net:1604
btcminer.ddns.net:1604
p2k15.ddns.net:1604
DC_MUTEX-H0WQWZT
-
gencode
skMDhHCCHML8
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe
-
Size
42.2MB
-
MD5
357b5f06e0a084f8c37e6a38afa29c76
-
SHA1
e7de8b81872b571e9e0fe6dcc48c94dfe8d50318
-
SHA256
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528
-
SHA512
ab539349cb46cdf4c2ce48569a123abc9634adebe68e0ccd19c89f008692651deb727892c1476796d0229965ed25d96b73735ce9ab86fad2bf67abd65ae9cd36
-
SSDEEP
786432:M129ofpkXbsydPnpeWjrqBqe4k51vJ8EhsI14StdNoIvTe3HzuREJgIkH5:Y29AwsydPnpXqBq4pmEhh4Sj9Te3TGEk
-
Darkcomet family
-
Pony family
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Sets service image path in registry
-
Uses Session Manager for persistence
Creates Session Manager registry key to run executable early in system boot.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Windows security modification
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Indicator Removal
1File Deletion
1Modify Registry
7Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
7Software Discovery
1Security Software Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1