General

  • Target

    ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86

  • Size

    3.8MB

  • Sample

    250116-gq87wavrhw

  • MD5

    3f97a9786bfec93a78c395e3077415e6

  • SHA1

    8fe20e712b62188c12cae7fba2f4875ea01c6c8f

  • SHA256

    ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86

  • SHA512

    ec78ac030f5139f787ace4555ffec710ef4ceba40af49d3d0d70b1d387b6979ae1777bb2465586d72af53406cae52ca62b3326b441b77f0874137b82ff8d8fbd

  • SSDEEP

    98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qs:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiO

Malware Config

Targets

    • Target

      ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86

    • Size

      3.8MB

    • MD5

      3f97a9786bfec93a78c395e3077415e6

    • SHA1

      8fe20e712b62188c12cae7fba2f4875ea01c6c8f

    • SHA256

      ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86

    • SHA512

      ec78ac030f5139f787ace4555ffec710ef4ceba40af49d3d0d70b1d387b6979ae1777bb2465586d72af53406cae52ca62b3326b441b77f0874137b82ff8d8fbd

    • SSDEEP

      98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qs:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiO

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks