General

  • Target

    43bbe26ae8e84675abd49903be937783f94822a4e53608c57ed4201dd06a1c28

  • Size

    1.3MB

  • Sample

    210515-wep6a4tex2

  • MD5

    64b79967a225599df24a4bc187dfa825

  • SHA1

    aa8520f7e61df4cdf3d26ae4339b72fa67b4742b

  • SHA256

    43bbe26ae8e84675abd49903be937783f94822a4e53608c57ed4201dd06a1c28

  • SHA512

    d4ab3a6c1784c8fe2d1b048b400aaac580e2bce21d751a17e20bbcac602fbfa07d00d01e5d9d8c2caee781e47acbe4e64eea0391519bc03d4d369a5f5b2adb54

Malware Config

Targets

    • Target

      43bbe26ae8e84675abd49903be937783f94822a4e53608c57ed4201dd06a1c28

    • Size

      1.3MB

    • MD5

      64b79967a225599df24a4bc187dfa825

    • SHA1

      aa8520f7e61df4cdf3d26ae4339b72fa67b4742b

    • SHA256

      43bbe26ae8e84675abd49903be937783f94822a4e53608c57ed4201dd06a1c28

    • SHA512

      d4ab3a6c1784c8fe2d1b048b400aaac580e2bce21d751a17e20bbcac602fbfa07d00d01e5d9d8c2caee781e47acbe4e64eea0391519bc03d4d369a5f5b2adb54

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Windows security bypass

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

Hidden Files and Directories

2
T1158

Discovery

System Information Discovery

1
T1082

Tasks