General

  • Target

    c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707N.exe

  • Size

    559KB

  • Sample

    241218-e2z28svjfp

  • MD5

    6deec6e80d6ddd51f3d4aec7eea65ea0

  • SHA1

    1e32843374a9a8c6e6a56854811c6f42c0eeb2e5

  • SHA256

    c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707

  • SHA512

    9c1c96c9742d64ffa7207a6646ded967e7acc73f5f119e97a2c8cd20e1100cb83053203be054e272e5456b7bf1f4bf4f898baf5fca76cc4ef4654bd4b0ece9e4

  • SSDEEP

    12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSd:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl/

Malware Config

Targets

    • Target

      c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707N.exe

    • Size

      559KB

    • MD5

      6deec6e80d6ddd51f3d4aec7eea65ea0

    • SHA1

      1e32843374a9a8c6e6a56854811c6f42c0eeb2e5

    • SHA256

      c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707

    • SHA512

      9c1c96c9742d64ffa7207a6646ded967e7acc73f5f119e97a2c8cd20e1100cb83053203be054e272e5456b7bf1f4bf4f898baf5fca76cc4ef4654bd4b0ece9e4

    • SSDEEP

      12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSd:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl/

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks