General

  • Target

    a37ac7f3d02f5d8b616ce794f064257022199150ed96319d8ff1a8ef7d29ad78N

  • Size

    1.3MB

  • Sample

    241105-tv14aaxjfq

  • MD5

    7f472561024a84c52505094c52870740

  • SHA1

    c356068f71a974ba40af7e69e372bd8276df32b7

  • SHA256

    a37ac7f3d02f5d8b616ce794f064257022199150ed96319d8ff1a8ef7d29ad78

  • SHA512

    27c3761f22bcf0db23d0cf6711ae4b819d8b5a0b0b7ae87c41228bb277f4472ae7117da1fddf33399d5e1fc237b0b2cb5793c98b69539e281b15ec629dd776f4

  • SSDEEP

    24576:Rp3uB1Woh51i9qIVEGcVbKY2tHjyCFWuE919c9C8ZtNced8JZ+IEqDiWsy:v3uB1bjfIsADdaiI/+TqDiJy

Malware Config

Targets

    • Target

      a37ac7f3d02f5d8b616ce794f064257022199150ed96319d8ff1a8ef7d29ad78N

    • Size

      1.3MB

    • MD5

      7f472561024a84c52505094c52870740

    • SHA1

      c356068f71a974ba40af7e69e372bd8276df32b7

    • SHA256

      a37ac7f3d02f5d8b616ce794f064257022199150ed96319d8ff1a8ef7d29ad78

    • SHA512

      27c3761f22bcf0db23d0cf6711ae4b819d8b5a0b0b7ae87c41228bb277f4472ae7117da1fddf33399d5e1fc237b0b2cb5793c98b69539e281b15ec629dd776f4

    • SSDEEP

      24576:Rp3uB1Woh51i9qIVEGcVbKY2tHjyCFWuE919c9C8ZtNced8JZ+IEqDiWsy:v3uB1bjfIsADdaiI/+TqDiJy

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks