General

  • Target

    00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8

  • Size

    3.8MB

  • Sample

    241107-xtxk9azmfp

  • MD5

    29afed2251a4eb2fb408de2b55e339c1

  • SHA1

    52f8d1477e704014515cc32743bdfdc9f30670ea

  • SHA256

    00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8

  • SHA512

    655390a44cfb73129abdd3c5de79ad57c474e426c6557adbb1f9e983380fd3ae3a9f0aae2d4f9e5f947a37488f0047694272dbecc49443875ec01fe16e5f008d

  • SSDEEP

    98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXc:vJwakG4fYrq1HJvpliCQHawbzBbGSlaC

Malware Config

Targets

    • Target

      00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8

    • Size

      3.8MB

    • MD5

      29afed2251a4eb2fb408de2b55e339c1

    • SHA1

      52f8d1477e704014515cc32743bdfdc9f30670ea

    • SHA256

      00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8

    • SHA512

      655390a44cfb73129abdd3c5de79ad57c474e426c6557adbb1f9e983380fd3ae3a9f0aae2d4f9e5f947a37488f0047694272dbecc49443875ec01fe16e5f008d

    • SSDEEP

      98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXc:vJwakG4fYrq1HJvpliCQHawbzBbGSlaC

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks