General

  • Target

    735d4dea1378e1735df51023397ba337eb72d3fc9ec806f04d47b182ba4b4779

  • Size

    520KB

  • Sample

    210924-gx7mmagadq

  • MD5

    2fc861e62742e8c9e534979d1aa3db9e

  • SHA1

    195d8fcf006e93b5c46b3a4ce4d3d12d62818201

  • SHA256

    735d4dea1378e1735df51023397ba337eb72d3fc9ec806f04d47b182ba4b4779

  • SHA512

    b299df8b0b18940f66e50ad17a30f779e2bbfd92781d7d9acc5d91522880b9d407a1d7952ebfdd92954df7187683e87b3eb81eb8d8a440d24cf39b0330039f62

Malware Config

Targets

    • Target

      735d4dea1378e1735df51023397ba337eb72d3fc9ec806f04d47b182ba4b4779

    • Size

      520KB

    • MD5

      2fc861e62742e8c9e534979d1aa3db9e

    • SHA1

      195d8fcf006e93b5c46b3a4ce4d3d12d62818201

    • SHA256

      735d4dea1378e1735df51023397ba337eb72d3fc9ec806f04d47b182ba4b4779

    • SHA512

      b299df8b0b18940f66e50ad17a30f779e2bbfd92781d7d9acc5d91522880b9d407a1d7952ebfdd92954df7187683e87b3eb81eb8d8a440d24cf39b0330039f62

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Tasks