General

  • Target

    2b4ee07d82837e1170065b673dab63a8fd46c522760f2b450c0f1e2bfaedef2e

  • Size

    3.1MB

  • Sample

    200624-e2tb6ewgvj

  • MD5

    48333dea99d9a2a7efe07b871e9e5467

  • SHA1

    85138443ba28a0932305454832e1f809585471ab

  • SHA256

    2b4ee07d82837e1170065b673dab63a8fd46c522760f2b450c0f1e2bfaedef2e

  • SHA512

    a7806de37c27afea682b4054c3caf1aafb94f858d7a7467efcf9e795484041391dd17941376e05118b4be726fc06beddedddc3f6fc6d5ab4b31c039fadf44ff0

Malware Config

Targets

    • Target

      2b4ee07d82837e1170065b673dab63a8fd46c522760f2b450c0f1e2bfaedef2e

    • Size

      3.1MB

    • MD5

      48333dea99d9a2a7efe07b871e9e5467

    • SHA1

      85138443ba28a0932305454832e1f809585471ab

    • SHA256

      2b4ee07d82837e1170065b673dab63a8fd46c522760f2b450c0f1e2bfaedef2e

    • SHA512

      a7806de37c27afea682b4054c3caf1aafb94f858d7a7467efcf9e795484041391dd17941376e05118b4be726fc06beddedddc3f6fc6d5ab4b31c039fadf44ff0

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

2
T1497

Hidden Files and Directories

2
T1158

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Tasks