General
-
Target
yes.exe.exe
-
Size
251KB
-
Sample
250330-sy3wlstpx5
-
MD5
61c55a38fb0de6ab47ccf098c827f9aa
-
SHA1
20593bb3d4b57ec87a3edb64d0492aa9dde3c259
-
SHA256
28ee0c31b4b8c0f850efd6d49073e9f2735c7587b0099190f0ca7d668c59a398
-
SHA512
e19cf44348ee6e3a3c55c5402c7c54dddedb0c8bccfeebf08aa49acf2393134c53d579521f9322461109747ea2f1e99fa4488f5e3e784324e425918f844b4ba5
-
SSDEEP
6144:mcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37a:mcW7KEZlPzCy37
Behavioral task
behavioral1
Sample
yes.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkcomet
gcplayer23
4.tcp.eu.ngrok.io:19834
GC_MUTEX-17DFY2D
-
InstallPath
Pekora\pekora.exe
-
gencode
UuWZrVebAwmk
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Pekora
Targets
-
-
Target
yes.exe.exe
-
Size
251KB
-
MD5
61c55a38fb0de6ab47ccf098c827f9aa
-
SHA1
20593bb3d4b57ec87a3edb64d0492aa9dde3c259
-
SHA256
28ee0c31b4b8c0f850efd6d49073e9f2735c7587b0099190f0ca7d668c59a398
-
SHA512
e19cf44348ee6e3a3c55c5402c7c54dddedb0c8bccfeebf08aa49acf2393134c53d579521f9322461109747ea2f1e99fa4488f5e3e784324e425918f844b4ba5
-
SSDEEP
6144:mcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37a:mcW7KEZlPzCy37
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2