General

  • Target

    bf1180e70a481ef1f3f6d1e328a67cd6b3752d765aa9ca571334189b3fd94516

  • Size

    3.1MB

  • Sample

    221205-xrnkkaba5y

  • MD5

    c3bfad0a2eb4f5bf78240aed5c372f8a

  • SHA1

    1cb2506bbf04b07c454b6064761bb4fc58571538

  • SHA256

    bf1180e70a481ef1f3f6d1e328a67cd6b3752d765aa9ca571334189b3fd94516

  • SHA512

    381787058b22d010a7de8b27404c18d193988fac532727b4a75ebff0738bfa62c69d4b2b74a647014efc2a00afa7d7afb88a7577c5be649331e402bfad0b689d

  • SSDEEP

    98304:9cEHGzo0TwhHZVYuHhp7RLv+ZVfMGMKPvJJ:9PmoPhHZVYS3WZVfXT

Malware Config

Targets

    • Target

      bf1180e70a481ef1f3f6d1e328a67cd6b3752d765aa9ca571334189b3fd94516

    • Size

      3.1MB

    • MD5

      c3bfad0a2eb4f5bf78240aed5c372f8a

    • SHA1

      1cb2506bbf04b07c454b6064761bb4fc58571538

    • SHA256

      bf1180e70a481ef1f3f6d1e328a67cd6b3752d765aa9ca571334189b3fd94516

    • SHA512

      381787058b22d010a7de8b27404c18d193988fac532727b4a75ebff0738bfa62c69d4b2b74a647014efc2a00afa7d7afb88a7577c5be649331e402bfad0b689d

    • SSDEEP

      98304:9cEHGzo0TwhHZVYuHhp7RLv+ZVfMGMKPvJJ:9PmoPhHZVYS3WZVfXT

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks