General

  • Target

    58ff732146073478474977c9378bc760_NEAS

  • Size

    576KB

  • Sample

    240507-njw3asge63

  • MD5

    58ff732146073478474977c9378bc760

  • SHA1

    6d3c2e06cce1bf9fb7f0ef2d419559e7b1adacec

  • SHA256

    cb28ecac74c56904ec99674c0d5c7c7cc130f68e59fd63188aeda8121a4b4a24

  • SHA512

    38cfab158233d25f022040f4d8196eccfea1db9bbf418814e439629a3871b141feb62647cc496798294eb4615453452a0b64958045d8e2d2d47171ed1dad6dcd

  • SSDEEP

    12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSV:+NWPkHlUfBgpuPdWzyuDTifgyWlQ

Malware Config

Targets

    • Target

      58ff732146073478474977c9378bc760_NEAS

    • Size

      576KB

    • MD5

      58ff732146073478474977c9378bc760

    • SHA1

      6d3c2e06cce1bf9fb7f0ef2d419559e7b1adacec

    • SHA256

      cb28ecac74c56904ec99674c0d5c7c7cc130f68e59fd63188aeda8121a4b4a24

    • SHA512

      38cfab158233d25f022040f4d8196eccfea1db9bbf418814e439629a3871b141feb62647cc496798294eb4615453452a0b64958045d8e2d2d47171ed1dad6dcd

    • SSDEEP

      12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSV:+NWPkHlUfBgpuPdWzyuDTifgyWlQ

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks