General

  • Target

    95c0d030c5f53d1133be30a35abdf0627f1cc15ce6b769d1565c656db44d289f

  • Size

    1.4MB

  • Sample

    210513-ey4jjkwyra

  • MD5

    c141544a4f99774f1bcf7defa3e3baba

  • SHA1

    ab484007489c1f7795edb0623dc4b1fce3310811

  • SHA256

    95c0d030c5f53d1133be30a35abdf0627f1cc15ce6b769d1565c656db44d289f

  • SHA512

    347e17179bb9db514701166f2f5061c2407d8e194e4ca91c99d6ff083ea1e4832791e1fdf47e410f582518a851724cfea7cf5e185142ba65b295b7dcf7503718

Malware Config

Targets

    • Target

      95c0d030c5f53d1133be30a35abdf0627f1cc15ce6b769d1565c656db44d289f

    • Size

      1.4MB

    • MD5

      c141544a4f99774f1bcf7defa3e3baba

    • SHA1

      ab484007489c1f7795edb0623dc4b1fce3310811

    • SHA256

      95c0d030c5f53d1133be30a35abdf0627f1cc15ce6b769d1565c656db44d289f

    • SHA512

      347e17179bb9db514701166f2f5061c2407d8e194e4ca91c99d6ff083ea1e4832791e1fdf47e410f582518a851724cfea7cf5e185142ba65b295b7dcf7503718

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Windows security bypass

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

5
T1112

Disabling Security Tools

2
T1089

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Tasks