General

  • Target

    d3089f6b3b583203c76258ec3a0c55ea78fca7fa84e91261922f73b54766ca2f

  • Size

    1.9MB

  • Sample

    210513-f9apardhk2

  • MD5

    39c4e0d317be94dd90138cbba7009f50

  • SHA1

    f606d43b09f51620415a749fea1da7f33b652ebb

  • SHA256

    d3089f6b3b583203c76258ec3a0c55ea78fca7fa84e91261922f73b54766ca2f

  • SHA512

    f7115ddeca1b6a70ff9c67e2a76f230a59f818815dba791d9dfd6cd9a764a3b0a38d1661cf0074b54ab93124c917859ee6fc9683dc236e395aef1dc68f902620

Malware Config

Targets

    • Target

      d3089f6b3b583203c76258ec3a0c55ea78fca7fa84e91261922f73b54766ca2f

    • Size

      1.9MB

    • MD5

      39c4e0d317be94dd90138cbba7009f50

    • SHA1

      f606d43b09f51620415a749fea1da7f33b652ebb

    • SHA256

      d3089f6b3b583203c76258ec3a0c55ea78fca7fa84e91261922f73b54766ca2f

    • SHA512

      f7115ddeca1b6a70ff9c67e2a76f230a59f818815dba791d9dfd6cd9a764a3b0a38d1661cf0074b54ab93124c917859ee6fc9683dc236e395aef1dc68f902620

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks