General

  • Target

    cf9e19205571c0dc595854b01d2292939517f469e19f28724a5db8c3f728b608

  • Size

    1.9MB

  • Sample

    210516-pej4c5f8kn

  • MD5

    c8e40b0239e76e084d28b19e611700df

  • SHA1

    a4166c99927fccfb4338c3902439fca15c4a26d9

  • SHA256

    cf9e19205571c0dc595854b01d2292939517f469e19f28724a5db8c3f728b608

  • SHA512

    e7e067720ae7860a7f75af6b041ea3aff58191a875a553d6c93eddb73339228fa9c9364c3872b288cd935ec43ba9f965a4efaaa4de2893f57b447bf9f7bc90d5

Malware Config

Targets

    • Target

      cf9e19205571c0dc595854b01d2292939517f469e19f28724a5db8c3f728b608

    • Size

      1.9MB

    • MD5

      c8e40b0239e76e084d28b19e611700df

    • SHA1

      a4166c99927fccfb4338c3902439fca15c4a26d9

    • SHA256

      cf9e19205571c0dc595854b01d2292939517f469e19f28724a5db8c3f728b608

    • SHA512

      e7e067720ae7860a7f75af6b041ea3aff58191a875a553d6c93eddb73339228fa9c9364c3872b288cd935ec43ba9f965a4efaaa4de2893f57b447bf9f7bc90d5

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks