General

  • Target

    963ad0005f9082bae33060722c0725ee50a4464c08229fc6376514a07dab348e

  • Size

    1.9MB

  • Sample

    210515-lfcygvw58n

  • MD5

    b59b198e170da97221264dda2d1b6d0b

  • SHA1

    eb3900951abbd3eeca751f3d6fdb1ba39f58bb6c

  • SHA256

    963ad0005f9082bae33060722c0725ee50a4464c08229fc6376514a07dab348e

  • SHA512

    4d13e289841a55f51b27d38c7dafbfeaebdba0b9d80c79ebd2018eb56fbff6fc6cac5cc854a509e0858d9c6d24ba3d227b1dcadfdb33ffdac49cc5dc7bc8f7e7

Malware Config

Targets

    • Target

      963ad0005f9082bae33060722c0725ee50a4464c08229fc6376514a07dab348e

    • Size

      1.9MB

    • MD5

      b59b198e170da97221264dda2d1b6d0b

    • SHA1

      eb3900951abbd3eeca751f3d6fdb1ba39f58bb6c

    • SHA256

      963ad0005f9082bae33060722c0725ee50a4464c08229fc6376514a07dab348e

    • SHA512

      4d13e289841a55f51b27d38c7dafbfeaebdba0b9d80c79ebd2018eb56fbff6fc6cac5cc854a509e0858d9c6d24ba3d227b1dcadfdb33ffdac49cc5dc7bc8f7e7

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks