General

  • Target

    354625dba53c10ab0d3b3e5401f7dd0e2fda480d75717b71a6e84f35f24ff3c2N.exe

  • Size

    3.8MB

  • Sample

    241115-y5966a1frp

  • MD5

    9ad543731e7c8df95ca19755de968770

  • SHA1

    5828cdbfa7f935f0d718391a4fbb1562d6c2d77c

  • SHA256

    354625dba53c10ab0d3b3e5401f7dd0e2fda480d75717b71a6e84f35f24ff3c2

  • SHA512

    b9590ec2ffa05bf23e9a128471eab4a34c85f8755330dd7d7b17917f6e9b796c42d77a1b82095284b1f012c2efaa32a642d1716bfb423ccf7bd2ad3dda28df62

  • SSDEEP

    98304:ki4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qQ:ki4hTLOMtHDMlANqnfVGPyhcMYg4lSiO

Malware Config

Targets

    • Target

      354625dba53c10ab0d3b3e5401f7dd0e2fda480d75717b71a6e84f35f24ff3c2N.exe

    • Size

      3.8MB

    • MD5

      9ad543731e7c8df95ca19755de968770

    • SHA1

      5828cdbfa7f935f0d718391a4fbb1562d6c2d77c

    • SHA256

      354625dba53c10ab0d3b3e5401f7dd0e2fda480d75717b71a6e84f35f24ff3c2

    • SHA512

      b9590ec2ffa05bf23e9a128471eab4a34c85f8755330dd7d7b17917f6e9b796c42d77a1b82095284b1f012c2efaa32a642d1716bfb423ccf7bd2ad3dda28df62

    • SSDEEP

      98304:ki4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qQ:ki4hTLOMtHDMlANqnfVGPyhcMYg4lSiO

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks