General

  • Target

    fbeda9aa7e1179a3bbbdc570a1b65f856e3d4e94f5fea28b3f667bb0e10c3517N.exe

  • Size

    576KB

  • Sample

    250120-wmnt4a1rer

  • MD5

    08e633488a55c999056d6a520080f9e0

  • SHA1

    98b4d5e15771fc8abf8eabc1ef93b2c56358f833

  • SHA256

    fbeda9aa7e1179a3bbbdc570a1b65f856e3d4e94f5fea28b3f667bb0e10c3517

  • SHA512

    847b6ff31d0ca612681680883646ad621d9546373e97034f6c14d2c5e443c0c81e4f800c89d446094df5975ff9f480f78f1d975d755bd6ac9322967a5f000183

  • SSDEEP

    12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSt:+NWPkHlUfBgpuPdWzyuDTifgyWlK

Malware Config

Targets

    • Target

      fbeda9aa7e1179a3bbbdc570a1b65f856e3d4e94f5fea28b3f667bb0e10c3517N.exe

    • Size

      576KB

    • MD5

      08e633488a55c999056d6a520080f9e0

    • SHA1

      98b4d5e15771fc8abf8eabc1ef93b2c56358f833

    • SHA256

      fbeda9aa7e1179a3bbbdc570a1b65f856e3d4e94f5fea28b3f667bb0e10c3517

    • SHA512

      847b6ff31d0ca612681680883646ad621d9546373e97034f6c14d2c5e443c0c81e4f800c89d446094df5975ff9f480f78f1d975d755bd6ac9322967a5f000183

    • SSDEEP

      12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSt:+NWPkHlUfBgpuPdWzyuDTifgyWlK

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks