General

  • Target

    8270e148478ac6886769640495e3e8dd0a5612b40f4da6cd1e662998d91cddf0

  • Size

    1.7MB

  • Sample

    201108-6zhax8v96n

  • MD5

    3adb0bd3fc62ac103e0d89c42088d4a7

  • SHA1

    7b792238778c5174efa375286dc1b30b7e8e05be

  • SHA256

    8270e148478ac6886769640495e3e8dd0a5612b40f4da6cd1e662998d91cddf0

  • SHA512

    7d695d23b0b840deffc0a0a406b8eae9f5ff9cfddbfc4300ded622495a92010c865b62080fcb9c7579c6d00bac0f5fe2b0063160ab256c83abf7f230f279d9b6

Malware Config

Targets

    • Target

      8270e148478ac6886769640495e3e8dd0a5612b40f4da6cd1e662998d91cddf0

    • Size

      1.7MB

    • MD5

      3adb0bd3fc62ac103e0d89c42088d4a7

    • SHA1

      7b792238778c5174efa375286dc1b30b7e8e05be

    • SHA256

      8270e148478ac6886769640495e3e8dd0a5612b40f4da6cd1e662998d91cddf0

    • SHA512

      7d695d23b0b840deffc0a0a406b8eae9f5ff9cfddbfc4300ded622495a92010c865b62080fcb9c7579c6d00bac0f5fe2b0063160ab256c83abf7f230f279d9b6

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Tasks