General

  • Target

    bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90aN.exe

  • Size

    576KB

  • Sample

    241218-ltcqasvncn

  • MD5

    c10a0c7f2d4093984324341c8947dfd0

  • SHA1

    edf40e1940938e46eeec1df5f9866c10b9ac39a2

  • SHA256

    bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90a

  • SHA512

    1c74b4ad5b84b55a258dde7b4e661a3e685d1a11456a8bee1320fe28500d69cf0521085e3013bc0da40f33ca135541af331f01edf09ea1bae89fdb7f1b1937a2

  • SSDEEP

    12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSO:+NWPkHlUfBgpuPdWzyuDTifgyWlv

Malware Config

Targets

    • Target

      bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90aN.exe

    • Size

      576KB

    • MD5

      c10a0c7f2d4093984324341c8947dfd0

    • SHA1

      edf40e1940938e46eeec1df5f9866c10b9ac39a2

    • SHA256

      bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90a

    • SHA512

      1c74b4ad5b84b55a258dde7b4e661a3e685d1a11456a8bee1320fe28500d69cf0521085e3013bc0da40f33ca135541af331f01edf09ea1bae89fdb7f1b1937a2

    • SSDEEP

      12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSO:+NWPkHlUfBgpuPdWzyuDTifgyWlv

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks