General

  • Target

    5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59N

  • Size

    3.8MB

  • Sample

    241104-yqt7dsvrdz

  • MD5

    1e349275288f530d34234aa37e72d4a0

  • SHA1

    67f2d33cdee5e54cc34477dcc441cc54bc6d2584

  • SHA256

    5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59

  • SHA512

    4e2a087495f0da2b6c6de3d25082f83cc6c5c7c2eef9a59f8a51b4300701f1139963035205bf23a0ce15b9037ee3f64dc6bb6d1b3f8057ff5b04179252a8a481

  • SSDEEP

    98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qN:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiP

Malware Config

Targets

    • Target

      5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59N

    • Size

      3.8MB

    • MD5

      1e349275288f530d34234aa37e72d4a0

    • SHA1

      67f2d33cdee5e54cc34477dcc441cc54bc6d2584

    • SHA256

      5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59

    • SHA512

      4e2a087495f0da2b6c6de3d25082f83cc6c5c7c2eef9a59f8a51b4300701f1139963035205bf23a0ce15b9037ee3f64dc6bb6d1b3f8057ff5b04179252a8a481

    • SSDEEP

      98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qN:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiP

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks