General

  • Target

    0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08N

  • Size

    559KB

  • Sample

    241022-q5w1jazfkr

  • MD5

    c9b7bd63799bcddc7f30a98c7d246d70

  • SHA1

    c39f771467dbc17b41e7e1f20d3afbe39ec8fa6f

  • SHA256

    0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08

  • SHA512

    fb16da4de24a6f0fd84d8cdf8022c16b05c3504336225ba92a8642fd5184f9e8c858c5f90a3d75e6e3c2f936f1a8416d806b2b7c5ae4855dd03bd6c43d309f4d

  • SSDEEP

    12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS9:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlH

Malware Config

Targets

    • Target

      0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08N

    • Size

      559KB

    • MD5

      c9b7bd63799bcddc7f30a98c7d246d70

    • SHA1

      c39f771467dbc17b41e7e1f20d3afbe39ec8fa6f

    • SHA256

      0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08

    • SHA512

      fb16da4de24a6f0fd84d8cdf8022c16b05c3504336225ba92a8642fd5184f9e8c858c5f90a3d75e6e3c2f936f1a8416d806b2b7c5ae4855dd03bd6c43d309f4d

    • SSDEEP

      12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS9:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlH

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks