General

  • Target

    e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3cN.exe

  • Size

    3.8MB

  • Sample

    241222-bg171sxjes

  • MD5

    ffedc93f2dc178fa2835db6fb56cc080

  • SHA1

    d21c470d84d3a3338e2d32cd3e52b93dcb85262c

  • SHA256

    e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3c

  • SHA512

    054a94cd1efc6c2a8950551111b4df454b8651b639d467502365e2121d0ccce3177d84078dff36d1dec508f6dd71c6aa846be7e83258abacd7b75e002462cc93

  • SSDEEP

    98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXd:vJwakG4fYrq1HJvpliCQHawbzBbGSlaj

Malware Config

Targets

    • Target

      e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3cN.exe

    • Size

      3.8MB

    • MD5

      ffedc93f2dc178fa2835db6fb56cc080

    • SHA1

      d21c470d84d3a3338e2d32cd3e52b93dcb85262c

    • SHA256

      e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3c

    • SHA512

      054a94cd1efc6c2a8950551111b4df454b8651b639d467502365e2121d0ccce3177d84078dff36d1dec508f6dd71c6aa846be7e83258abacd7b75e002462cc93

    • SSDEEP

      98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXd:vJwakG4fYrq1HJvpliCQHawbzBbGSlaj

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks