General

  • Target

    02be1aed51c3b455caf9915f03015cd820d5cdf22be36bdb5f829f1f61ed3cc1

  • Size

    3.8MB

  • Sample

    250101-xtx7sa1qbk

  • MD5

    4e865c306cb57c5999e349670b35be8c

  • SHA1

    be02328e0181176305e59503913a637f1cedc2c9

  • SHA256

    02be1aed51c3b455caf9915f03015cd820d5cdf22be36bdb5f829f1f61ed3cc1

  • SHA512

    10cde9ee9ec71a1efd7d3de3d13ae8e1543a89c819e82be31c15aef327ecf2be2fc415d9d8f65e1de58d834db968043ad558164a3b7dea83f934b0af07837007

  • SSDEEP

    98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qs:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSii

Malware Config

Targets

    • Target

      02be1aed51c3b455caf9915f03015cd820d5cdf22be36bdb5f829f1f61ed3cc1

    • Size

      3.8MB

    • MD5

      4e865c306cb57c5999e349670b35be8c

    • SHA1

      be02328e0181176305e59503913a637f1cedc2c9

    • SHA256

      02be1aed51c3b455caf9915f03015cd820d5cdf22be36bdb5f829f1f61ed3cc1

    • SHA512

      10cde9ee9ec71a1efd7d3de3d13ae8e1543a89c819e82be31c15aef327ecf2be2fc415d9d8f65e1de58d834db968043ad558164a3b7dea83f934b0af07837007

    • SSDEEP

      98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qs:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSii

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks