General

  • Target

    4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d

  • Size

    589KB

  • Sample

    250102-2vxpvsskcl

  • MD5

    d3897ba54f556a71936e1028c40e092c

  • SHA1

    4c2ffb75cea1c906eaff076406c4e917f21fd459

  • SHA256

    4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d

  • SHA512

    c8a20733d173fdce060b3baad8ee035b5cf1fee7a63ad6fb8cdb7f7bf5db3a50e12e17322581196e1b294bbb751c9cdeca6a1624f660bcae1d131cf938e106f0

  • SSDEEP

    12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSX:9fTOIQIu7k5DzvLxm5Bl8sH

Malware Config

Targets

    • Target

      4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d

    • Size

      589KB

    • MD5

      d3897ba54f556a71936e1028c40e092c

    • SHA1

      4c2ffb75cea1c906eaff076406c4e917f21fd459

    • SHA256

      4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d

    • SHA512

      c8a20733d173fdce060b3baad8ee035b5cf1fee7a63ad6fb8cdb7f7bf5db3a50e12e17322581196e1b294bbb751c9cdeca6a1624f660bcae1d131cf938e106f0

    • SSDEEP

      12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSX:9fTOIQIu7k5DzvLxm5Bl8sH

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks