MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d96847f7962c01a7951f95acb29dff7999b7e8d54c946b3b1ccd035cbf2bcb1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkComet


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 3d96847f7962c01a7951f95acb29dff7999b7e8d54c946b3b1ccd035cbf2bcb1
SHA3-384 hash: d9ff01e419d877cfbc39c0135c421c851898577b37d61e27a6eddc5e04a8a1d6d20b0c4a634e00e0400ecd6825ba2309
SHA1 hash: e0e72f3a636f4dcd87bb5606f24fe0ff298fbb74
MD5 hash: 20799f295c5b0e5aa27b5896b230b57a
humanhash: monkey-failed-network-paris
File name:SBHJYT.exe
Download: download sample
Signature DarkComet
File size:14'532'877 bytes
First seen:2021-08-14 06:50:08 UTC
Last seen:2021-08-14 07:56:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d3bf8a7746a8d1ee8f6e5960c3f69378 (247 x Formbook, 75 x AgentTesla, 64 x SnakeKeylogger)
ssdeep 24576:0RmJkcoQricOIQxiZY1iaGVR2L1IQnr/hEzgF82oN5TKnKYEDrHqANbbNBW6Db6b:RJZoQrbTFZY1iaIR2B
Threatray 322 similar samples on MalwareBazaar
TLSH T1B2E6DBCCC82A01D5A59B3195F5C0B8427683BEE8390DEDAEC709F0F72662DB958D485F
dhash icon bc926c3c11891355 (1 x DarkComet)
Reporter abuse_ch
Tags:DarkComet exe RAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
807
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SBHJYT.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-14 06:52:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file in the %temp% subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun
Result
Verdict:
MALICIOUS
Result
Threat name:
DarkComet
Detection:
malicious
Classification:
troj.evad
Score:
75 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Uses cmd line tools excessively to alter registry or file data
Yara detected DarkComet
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 465219 Sample: SBHJYT.exe Startdate: 14/08/2021 Architecture: WINDOWS Score: 75 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus / Scanner detection for submitted sample 2->44 46 Yara detected DarkComet 2->46 8 SBHJYT.exe 2->8         started        11 msdcsc.exe 2->11         started        13 msdcsc.exe 2->13         started        process3 signatures4 50 Injects a PE file into a foreign processes 8->50 15 SBHJYT.exe 1 4 8->15         started        52 Antivirus detection for dropped file 11->52 54 Multi AV Scanner detection for dropped file 11->54 process5 file6 34 C:\Users\user\AppData\Local\...\msdcsc.exe, PE32 15->34 dropped 36 C:\Users\user\...\msdcsc.exe:Zone.Identifier, ASCII 15->36 dropped 38 Creates an undocumented autostart registry key 15->38 19 cmd.exe 1 15->19         started        22 cmd.exe 1 15->22         started        24 msdcsc.exe 15->24         started        signatures7 process8 signatures9 48 Uses cmd line tools excessively to alter registry or file data 19->48 26 conhost.exe 19->26         started        28 attrib.exe 1 19->28         started        30 conhost.exe 22->30         started        32 attrib.exe 1 22->32         started        process10
Threat name:
Win32.Trojan.Nymeria
Status:
Malicious
First seen:
2021-08-14 06:51:06 UTC
AV detection:
18 of 46 (39.13%)
Threat level:
  5/5
Result
Malware family:
darkcomet
Score:
  10/10
Tags:
family:darkcomet evasion persistence rat suricata trojan
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Suspicious use of SetThreadContext
autoit_exe
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Windows security modification
Disables RegEdit via registry modification
Disables Task Manager via registry modification
Executes dropped EXE
Sets file to hidden
Darkcomet
Modifies WinLogon for persistence
Modifies firewall policy service
Modifies security service
Windows security bypass
suricata: ET MALWARE Backdoor.Win32.DarkComet Screenshot Upload Successful
Unpacked files
SH256 hash:
40706697fb5f133970d45ea6e43c051d096c86b301ae0b9521ccdf57f3642ce1
MD5 hash:
7b527bd915fadab0414a9711d2d21da6
SHA1 hash:
a3ec191e57df9017f948f24bbc6d7b9fc09f1735
Detections:
win_darkcomet_g0 win_darkcomet_auto
SH256 hash:
3d96847f7962c01a7951f95acb29dff7999b7e8d54c946b3b1ccd035cbf2bcb1
MD5 hash:
20799f295c5b0e5aa27b5896b230b57a
SHA1 hash:
e0e72f3a636f4dcd87bb5606f24fe0ff298fbb74
Malware family:
DarkComet
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments