General

  • Target

    4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295N.exe

  • Size

    576KB

  • Sample

    241216-emm45avlcm

  • MD5

    9f7d633ce5a8f7841f1d36234f57aa40

  • SHA1

    bd9c9496dd3694157681066d56815e7192498593

  • SHA256

    4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295

  • SHA512

    2aa3c6f21c3ce2468241f55eaee51b7f5c1c7f111e4e4a663137c1c4483d2f700afd320a0891a040fc0f6f2c968ce9d9c953fed33aa6241724db1510b2bc3be5

  • SSDEEP

    12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSQ:+NWPkHlUfBgpuPdWzyuDTifgyWln

Malware Config

Targets

    • Target

      4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295N.exe

    • Size

      576KB

    • MD5

      9f7d633ce5a8f7841f1d36234f57aa40

    • SHA1

      bd9c9496dd3694157681066d56815e7192498593

    • SHA256

      4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295

    • SHA512

      2aa3c6f21c3ce2468241f55eaee51b7f5c1c7f111e4e4a663137c1c4483d2f700afd320a0891a040fc0f6f2c968ce9d9c953fed33aa6241724db1510b2bc3be5

    • SSDEEP

      12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSQ:+NWPkHlUfBgpuPdWzyuDTifgyWln

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks