General

  • Target

    54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad

  • Size

    576KB

  • Sample

    241105-2hhp6s1blp

  • MD5

    005fff98861d685b2128155a51b944bd

  • SHA1

    102c0b1475775255bd3181723a831bb470209c9f

  • SHA256

    54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad

  • SHA512

    f4dcfd2be5eb66d7029c3358ccc5dfe7d0c74720b6ac1aaff7c9986e4e716899636a977d036d9c38cdcaf5fb6c40461b506b17d65c527f375c7202c8d98095db

  • SSDEEP

    12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSw:+NWPkHlUfBgpuPdWzyuDTifgyWlt

Malware Config

Targets

    • Target

      54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad

    • Size

      576KB

    • MD5

      005fff98861d685b2128155a51b944bd

    • SHA1

      102c0b1475775255bd3181723a831bb470209c9f

    • SHA256

      54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad

    • SHA512

      f4dcfd2be5eb66d7029c3358ccc5dfe7d0c74720b6ac1aaff7c9986e4e716899636a977d036d9c38cdcaf5fb6c40461b506b17d65c527f375c7202c8d98095db

    • SSDEEP

      12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSw:+NWPkHlUfBgpuPdWzyuDTifgyWlt

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks