General

  • Target

    d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce

  • Size

    576KB

  • Sample

    241019-ednz3axerk

  • MD5

    f678e5e1ae32254392d2db37e5753bc5

  • SHA1

    b3a22c78e65ed29359a30695e57358c8c5279c8d

  • SHA256

    d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce

  • SHA512

    5c7ef7dc0f9b059b7c5f08d7a321e198e67427aeb26ba6d9acae82f0ee2a90ba7087df4ae25911316a6f07d5268b50f4f93d82df2c561dd54b9b7fc144726601

  • SSDEEP

    12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSm:+NWPkHlUfBgpuPdWzyuDTifgyWl1

Malware Config

Targets

    • Target

      d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce

    • Size

      576KB

    • MD5

      f678e5e1ae32254392d2db37e5753bc5

    • SHA1

      b3a22c78e65ed29359a30695e57358c8c5279c8d

    • SHA256

      d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce

    • SHA512

      5c7ef7dc0f9b059b7c5f08d7a321e198e67427aeb26ba6d9acae82f0ee2a90ba7087df4ae25911316a6f07d5268b50f4f93d82df2c561dd54b9b7fc144726601

    • SSDEEP

      12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSm:+NWPkHlUfBgpuPdWzyuDTifgyWl1

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks