General

  • Target

    79b3aa57e5b7e5ff4761bff863c53a616a814852aa79ae3d07a48098b24d4336

  • Size

    3.9MB

  • Sample

    241226-3rq9cavpfw

  • MD5

    bdca41745bf71ee13037b81a4db75962

  • SHA1

    c07d5786c2c50c784b3b20aab596b278496be895

  • SHA256

    79b3aa57e5b7e5ff4761bff863c53a616a814852aa79ae3d07a48098b24d4336

  • SHA512

    7fdf6b6df53918d9a943312af773f0e81a1a047973b20f5bded0eafc4e735c9147f0999b2b6fbdc03011e124087885fb3848e6502956b21143146c22096092da

  • SSDEEP

    98304:IlX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBAlB6D4tyX6kuT4IkQApCgvms0Cv05J5C0:IlX3KMj7yBNUVPhd5G0Z5DxdM3hZpmB0

Malware Config

Targets

    • Target

      79b3aa57e5b7e5ff4761bff863c53a616a814852aa79ae3d07a48098b24d4336

    • Size

      3.9MB

    • MD5

      bdca41745bf71ee13037b81a4db75962

    • SHA1

      c07d5786c2c50c784b3b20aab596b278496be895

    • SHA256

      79b3aa57e5b7e5ff4761bff863c53a616a814852aa79ae3d07a48098b24d4336

    • SHA512

      7fdf6b6df53918d9a943312af773f0e81a1a047973b20f5bded0eafc4e735c9147f0999b2b6fbdc03011e124087885fb3848e6502956b21143146c22096092da

    • SSDEEP

      98304:IlX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBAlB6D4tyX6kuT4IkQApCgvms0Cv05J5C0:IlX3KMj7yBNUVPhd5G0Z5DxdM3hZpmB0

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks