General

  • Target

    0ebda2027f478ceb915771aa4536b965e53ae6034160b5649269f62f26897c22

  • Size

    3.9MB

  • Sample

    240909-xcyrzswalh

  • MD5

    9e9fd81095efb49820ceb84b69e310ab

  • SHA1

    29dd91a7553c39c0926be884de2d9fde0cefb3a4

  • SHA256

    0ebda2027f478ceb915771aa4536b965e53ae6034160b5649269f62f26897c22

  • SHA512

    1957143abd85d7f0bc04c148f3236ce5317c504d829e68818914e5ec3c710945c065569c2359433f9fb088d147db2cdc25fb126c1786f1baa3845160d9933e5f

  • SSDEEP

    98304:8lX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBAlB6D4tyX6kuT4IkQApCgvms0Cv05J5C+:8lX3KMj7yBNUVPhd5G0Z5DxdM3hZpmB+

Malware Config

Targets

    • Target

      0ebda2027f478ceb915771aa4536b965e53ae6034160b5649269f62f26897c22

    • Size

      3.9MB

    • MD5

      9e9fd81095efb49820ceb84b69e310ab

    • SHA1

      29dd91a7553c39c0926be884de2d9fde0cefb3a4

    • SHA256

      0ebda2027f478ceb915771aa4536b965e53ae6034160b5649269f62f26897c22

    • SHA512

      1957143abd85d7f0bc04c148f3236ce5317c504d829e68818914e5ec3c710945c065569c2359433f9fb088d147db2cdc25fb126c1786f1baa3845160d9933e5f

    • SSDEEP

      98304:8lX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBAlB6D4tyX6kuT4IkQApCgvms0Cv05J5C+:8lX3KMj7yBNUVPhd5G0Z5DxdM3hZpmB+

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks