General

  • Target

    c8bf059ebf4161fe3a8edb1430389c89a09425089e5ccf2587d88ebb1ef5cb6e

  • Size

    1.9MB

  • Sample

    210515-sawmykgtaj

  • MD5

    bfff1c43fa84308b29894cfc0e4e3c8b

  • SHA1

    cb7997b5749bc85627ccbb1ba8c168b437555e63

  • SHA256

    c8bf059ebf4161fe3a8edb1430389c89a09425089e5ccf2587d88ebb1ef5cb6e

  • SHA512

    0a9d24f1a0918f1d2b90e184302a1637938d378bf8f35519d06aebb62d52de676ab9758c94a5651d74bbf6670ffceed4c22dcea001123e4e5b2ee07aa695a315

Malware Config

Targets

    • Target

      c8bf059ebf4161fe3a8edb1430389c89a09425089e5ccf2587d88ebb1ef5cb6e

    • Size

      1.9MB

    • MD5

      bfff1c43fa84308b29894cfc0e4e3c8b

    • SHA1

      cb7997b5749bc85627ccbb1ba8c168b437555e63

    • SHA256

      c8bf059ebf4161fe3a8edb1430389c89a09425089e5ccf2587d88ebb1ef5cb6e

    • SHA512

      0a9d24f1a0918f1d2b90e184302a1637938d378bf8f35519d06aebb62d52de676ab9758c94a5651d74bbf6670ffceed4c22dcea001123e4e5b2ee07aa695a315

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks