General

  • Target

    8a494b49ce0694448248a9a0ac26ee5d1fd285cde560ce5153742c0788f3e33c

  • Size

    1.9MB

  • Sample

    210516-x72t9efk9e

  • MD5

    b6ce6f433f8fb8aa757c7d1ba1e16e41

  • SHA1

    b10137e51748a67198f6fa0aa0f4d159a8ce20bd

  • SHA256

    8a494b49ce0694448248a9a0ac26ee5d1fd285cde560ce5153742c0788f3e33c

  • SHA512

    dab515d1548d464204b5e98dff9e16cb459f3cc9d5e80edeab5726e7e4345454beff8dd8eb46a51ad7b742d21e9063c446b0aee6b02f9e44f698c4ddef2ad72c

Malware Config

Targets

    • Target

      8a494b49ce0694448248a9a0ac26ee5d1fd285cde560ce5153742c0788f3e33c

    • Size

      1.9MB

    • MD5

      b6ce6f433f8fb8aa757c7d1ba1e16e41

    • SHA1

      b10137e51748a67198f6fa0aa0f4d159a8ce20bd

    • SHA256

      8a494b49ce0694448248a9a0ac26ee5d1fd285cde560ce5153742c0788f3e33c

    • SHA512

      dab515d1548d464204b5e98dff9e16cb459f3cc9d5e80edeab5726e7e4345454beff8dd8eb46a51ad7b742d21e9063c446b0aee6b02f9e44f698c4ddef2ad72c

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks