General

  • Target

    d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40

  • Size

    574KB

  • Sample

    241105-e4mjxsxkdq

  • MD5

    f1fd5061244fa6098246e16dc2229c74

  • SHA1

    fb914c5f6cd90bc3ea926b9b8345f18a955d0fa9

  • SHA256

    d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40

  • SHA512

    6c11a720ed0fbbb5553644bf962f6691b0f30a6ddf0a1a9f0b1ffb3a496f9c49543cb81669a14f90a994946ce9e842ede2f1d3c0f4fe2c090089dc0a122a6e00

  • SSDEEP

    12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubb:zFhWAfn22m0eD1GPz8HdxP

Malware Config

Targets

    • Target

      d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40

    • Size

      574KB

    • MD5

      f1fd5061244fa6098246e16dc2229c74

    • SHA1

      fb914c5f6cd90bc3ea926b9b8345f18a955d0fa9

    • SHA256

      d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40

    • SHA512

      6c11a720ed0fbbb5553644bf962f6691b0f30a6ddf0a1a9f0b1ffb3a496f9c49543cb81669a14f90a994946ce9e842ede2f1d3c0f4fe2c090089dc0a122a6e00

    • SSDEEP

      12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubb:zFhWAfn22m0eD1GPz8HdxP

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks