General

  • Target

    1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e

  • Size

    574KB

  • Sample

    241005-xtxw1svbqf

  • MD5

    343e37c5a1931c2e475fbef2b341187a

  • SHA1

    7f1f4be94a2b31d9971f73fdf33b05951f8c89a1

  • SHA256

    1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e

  • SHA512

    9214260e69ff5e9182a991b61eb6657f44c74367a6c4b525b0d7bd06319e9f540043652bb0fdc9772f64cb4d2d0f8630b8c4babdd44c1d2db234d0c885bf1505

  • SSDEEP

    12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubX:zFhWAfn22m0eD1GPz8HdxT

Malware Config

Targets

    • Target

      1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e

    • Size

      574KB

    • MD5

      343e37c5a1931c2e475fbef2b341187a

    • SHA1

      7f1f4be94a2b31d9971f73fdf33b05951f8c89a1

    • SHA256

      1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e

    • SHA512

      9214260e69ff5e9182a991b61eb6657f44c74367a6c4b525b0d7bd06319e9f540043652bb0fdc9772f64cb4d2d0f8630b8c4babdd44c1d2db234d0c885bf1505

    • SSDEEP

      12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubX:zFhWAfn22m0eD1GPz8HdxT

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks