General

  • Target

    df7b910bbc8fdb3e6f99037236ac9c84b42c42639ccf9c63939a79b6457b6185N

  • Size

    574KB

  • Sample

    241112-x1rnkssmfl

  • MD5

    b437208edc36467cec9c9d7552d8ef50

  • SHA1

    adbfc7026f15e6c74b9deaf8a3c484294b654c2a

  • SHA256

    df7b910bbc8fdb3e6f99037236ac9c84b42c42639ccf9c63939a79b6457b6185

  • SHA512

    5e075523f346d7764e21f953a0b062248f2341b31a434abd4f4e0b93eec0a3b71ecd141192abe2ae16698dee9fbd144b399a1163c24b2a9c67d37d233c2fd4e9

  • SSDEEP

    12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsub6:zFhWAfn22m0eD1GPz8HdxO

Malware Config

Targets

    • Target

      df7b910bbc8fdb3e6f99037236ac9c84b42c42639ccf9c63939a79b6457b6185N

    • Size

      574KB

    • MD5

      b437208edc36467cec9c9d7552d8ef50

    • SHA1

      adbfc7026f15e6c74b9deaf8a3c484294b654c2a

    • SHA256

      df7b910bbc8fdb3e6f99037236ac9c84b42c42639ccf9c63939a79b6457b6185

    • SHA512

      5e075523f346d7764e21f953a0b062248f2341b31a434abd4f4e0b93eec0a3b71ecd141192abe2ae16698dee9fbd144b399a1163c24b2a9c67d37d233c2fd4e9

    • SSDEEP

      12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsub6:zFhWAfn22m0eD1GPz8HdxO

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks