General

  • Target

    7f83e96df5105f1f717e1e34915bb5d3bd0f411fbd3f4fd75433dcfee1155ca4

  • Size

    3.9MB

  • Sample

    241030-bhxwzsskbw

  • MD5

    e66a7cc714310b83718173d51cc496d5

  • SHA1

    011e86f661c66ebd697bc915ea478f17d597a91b

  • SHA256

    7f83e96df5105f1f717e1e34915bb5d3bd0f411fbd3f4fd75433dcfee1155ca4

  • SHA512

    a49976acc39623ddac00d9611458de5fe66b1dda4ad3bc352902570edd619e04f52d8fd75c9be66d6c630dec1ab12bf3af191b24d2bd1336197db3f3ff66a78a

  • SSDEEP

    98304:alX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBAlB6D4tyX6kuT4IkQApCgvms0Cv05J5Cr:alX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBr

Malware Config

Targets

    • Target

      7f83e96df5105f1f717e1e34915bb5d3bd0f411fbd3f4fd75433dcfee1155ca4

    • Size

      3.9MB

    • MD5

      e66a7cc714310b83718173d51cc496d5

    • SHA1

      011e86f661c66ebd697bc915ea478f17d597a91b

    • SHA256

      7f83e96df5105f1f717e1e34915bb5d3bd0f411fbd3f4fd75433dcfee1155ca4

    • SHA512

      a49976acc39623ddac00d9611458de5fe66b1dda4ad3bc352902570edd619e04f52d8fd75c9be66d6c630dec1ab12bf3af191b24d2bd1336197db3f3ff66a78a

    • SSDEEP

      98304:alX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBAlB6D4tyX6kuT4IkQApCgvms0Cv05J5Cr:alX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBr

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks