General

  • Target

    Payment Invoice.zip

  • Size

    298KB

  • Sample

    210219-5zxglc8bma

  • MD5

    fa588171489399bed272e9ac110f863c

  • SHA1

    9d1c665e5da7252754357017c651a81d7903bfd4

  • SHA256

    36e80c63a48af084e483910b7a42ecac4ed48d76c53ab8a300ad410bd0adba94

  • SHA512

    cf75d10f61a1a52064b0c752d10838ffe1514f498b3e5a582448254ca84fa8a351cffd751a00bc04596d73a844c5923e48b3c076e8b578d21baf90f378b614b0

Score
10/10

Malware Config

Targets

    • Target

      JOIN.exe

    • Size

      848KB

    • MD5

      ff65699609255332366bf5416fb38869

    • SHA1

      80e9e78f4c4be3daa256ba1e37235a7f159bd25a

    • SHA256

      554711ee1f28155e4b972efff5299f79a054d31eeb18a5ce64f1617982eaeeae

    • SHA512

      0e5a383e6332aee7c31c0ab60ad9d9d1e427dbe28836837a994b0ebac0eb2fe0b9741accfcb386000eb5fd19ac87adcbf86744802886b410c42887a277e9c262

    Score
    10/10
    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks