General

  • Target

    8e8464b9cb182bff66d6b120e1afcd572a69841b024e8e036eeeefad438cd0f6

  • Size

    333KB

  • Sample

    221123-w7sc1shb3v

  • MD5

    43b6dfffd47b4d4f3d23cdd3cce7e730

  • SHA1

    1de316fc167f9e504658859f8cf4cd4d34140310

  • SHA256

    8e8464b9cb182bff66d6b120e1afcd572a69841b024e8e036eeeefad438cd0f6

  • SHA512

    532111c665a45bb9885a0c89d2e31a9779833d2913bcf1f0f2b27c0541db03e2032b573849339e16681bb873c8267a3a46c13e125f4b0e2bb416fd6923bfa10b

  • SSDEEP

    6144:KpNuoZB8CK7pJId0xyQkRqm9hd5ManyCVfKcwuzqCFRwmvYaKY:yA7pqd0xyXfvMcfuBCDwmf

Malware Config

Targets

    • Target

      8e8464b9cb182bff66d6b120e1afcd572a69841b024e8e036eeeefad438cd0f6

    • Size

      333KB

    • MD5

      43b6dfffd47b4d4f3d23cdd3cce7e730

    • SHA1

      1de316fc167f9e504658859f8cf4cd4d34140310

    • SHA256

      8e8464b9cb182bff66d6b120e1afcd572a69841b024e8e036eeeefad438cd0f6

    • SHA512

      532111c665a45bb9885a0c89d2e31a9779833d2913bcf1f0f2b27c0541db03e2032b573849339e16681bb873c8267a3a46c13e125f4b0e2bb416fd6923bfa10b

    • SSDEEP

      6144:KpNuoZB8CK7pJId0xyQkRqm9hd5ManyCVfKcwuzqCFRwmvYaKY:yA7pqd0xyXfvMcfuBCDwmf

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks