General

  • Target

    cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d

  • Size

    3.9MB

  • Sample

    201106-w92wdedw4j

  • MD5

    f779b9615b86f9dded7f6de1e5c3178c

  • SHA1

    932bb2bb8ee87f26726f0cfd01113fbe65936271

  • SHA256

    cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d

  • SHA512

    710b974627772a4fbf600fb0417690bbc4b956d4d25debae2748f23be473ce17f5356df9f37d17a3b65bcfd462f3bb8377d21af001f9f5e619ff01a2cfcbf500

Malware Config

Targets

    • Target

      cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d

    • Size

      3.9MB

    • MD5

      f779b9615b86f9dded7f6de1e5c3178c

    • SHA1

      932bb2bb8ee87f26726f0cfd01113fbe65936271

    • SHA256

      cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d

    • SHA512

      710b974627772a4fbf600fb0417690bbc4b956d4d25debae2748f23be473ce17f5356df9f37d17a3b65bcfd462f3bb8377d21af001f9f5e619ff01a2cfcbf500

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks