General

  • Target

    3c753955fb74bccd65c30f3b57e209a7e8330c7292b8deea8de350b252b16e3c.exe

  • Size

    574KB

  • Sample

    241219-fvw8fa1jgq

  • MD5

    2db2f3af697ce2a9b43aa324d9f2f607

  • SHA1

    8fa6e9f948f2fab5ed5bf9cc0ff564973cd7c89d

  • SHA256

    3c753955fb74bccd65c30f3b57e209a7e8330c7292b8deea8de350b252b16e3c

  • SHA512

    b5199fd6d2f3ae0c88bf7cdce66c49db978b32f0bde3d0a2a4b8f06b8c89690d6cf3e67efcd505e458c4986a2a00bfdbba338d52a4260cbd8a2cc863ad465b44

  • SSDEEP

    12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubV:zFhWAfn22m0eD1GPz8Hdxx

Malware Config

Targets

    • Target

      3c753955fb74bccd65c30f3b57e209a7e8330c7292b8deea8de350b252b16e3c.exe

    • Size

      574KB

    • MD5

      2db2f3af697ce2a9b43aa324d9f2f607

    • SHA1

      8fa6e9f948f2fab5ed5bf9cc0ff564973cd7c89d

    • SHA256

      3c753955fb74bccd65c30f3b57e209a7e8330c7292b8deea8de350b252b16e3c

    • SHA512

      b5199fd6d2f3ae0c88bf7cdce66c49db978b32f0bde3d0a2a4b8f06b8c89690d6cf3e67efcd505e458c4986a2a00bfdbba338d52a4260cbd8a2cc863ad465b44

    • SSDEEP

      12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubV:zFhWAfn22m0eD1GPz8Hdxx

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks