General

  • Target

    cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280N.exe

  • Size

    3.8MB

  • Sample

    250104-nfzn1sxkat

  • MD5

    b1f861214980af5ccda8662cf97c7270

  • SHA1

    6dbc6d1d51a38fc2288af390562ebf1f4a52905a

  • SHA256

    cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280

  • SHA512

    a3371bf3cab6ce626dd8867005189528772a8829d4dceaf840eb70a7f71aa3285392ca6515415f5dd922517e2ff271d82e377e5bafbcbc32fa10ba90f8497a02

  • SSDEEP

    98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qO:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi4

Malware Config

Targets

    • Target

      cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280N.exe

    • Size

      3.8MB

    • MD5

      b1f861214980af5ccda8662cf97c7270

    • SHA1

      6dbc6d1d51a38fc2288af390562ebf1f4a52905a

    • SHA256

      cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280

    • SHA512

      a3371bf3cab6ce626dd8867005189528772a8829d4dceaf840eb70a7f71aa3285392ca6515415f5dd922517e2ff271d82e377e5bafbcbc32fa10ba90f8497a02

    • SSDEEP

      98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qO:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi4

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks