General

  • Target

    7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb.exe

  • Size

    559KB

  • Sample

    241205-fqqj4awldm

  • MD5

    c576239f3d7d7c32e483a2761d53ea2c

  • SHA1

    f8360f82db77b5e8babd7ad9874259f10bdcf7a3

  • SHA256

    7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb

  • SHA512

    3456a3c7d9e3081ed75f0f3dcdc1d3a083d45fa68eeaeab6ef01a84087b1d7357f7c3dd60025529d23fb39b8a12557b30f1b4b757b9d51ca8b1f46b9631010ce

  • SSDEEP

    12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS8:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl+

Malware Config

Targets

    • Target

      7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb.exe

    • Size

      559KB

    • MD5

      c576239f3d7d7c32e483a2761d53ea2c

    • SHA1

      f8360f82db77b5e8babd7ad9874259f10bdcf7a3

    • SHA256

      7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb

    • SHA512

      3456a3c7d9e3081ed75f0f3dcdc1d3a083d45fa68eeaeab6ef01a84087b1d7357f7c3dd60025529d23fb39b8a12557b30f1b4b757b9d51ca8b1f46b9631010ce

    • SSDEEP

      12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS8:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl+

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks