General

  • Target

    4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01N.exe

  • Size

    589KB

  • Sample

    250121-c6dcxsskaq

  • MD5

    b345f448f01bd76ae15da77e85fb7440

  • SHA1

    ebc2652874a10fabb92b4a2ca15b220f7187e943

  • SHA256

    4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01

  • SHA512

    97a8c4a976a06e2d92a5ebb7a9d2e29ef0008abbc53c5a311f47f9e1f2a2d2cfd41bb56994adb6465e98dc44b1ffee302f4f5b3f9b04c1d9d81f5014e2e8c806

  • SSDEEP

    12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oST:9fTOIQIu7k5DzvLxm5Bl8sD

Malware Config

Targets

    • Target

      4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01N.exe

    • Size

      589KB

    • MD5

      b345f448f01bd76ae15da77e85fb7440

    • SHA1

      ebc2652874a10fabb92b4a2ca15b220f7187e943

    • SHA256

      4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01

    • SHA512

      97a8c4a976a06e2d92a5ebb7a9d2e29ef0008abbc53c5a311f47f9e1f2a2d2cfd41bb56994adb6465e98dc44b1ffee302f4f5b3f9b04c1d9d81f5014e2e8c806

    • SSDEEP

      12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oST:9fTOIQIu7k5DzvLxm5Bl8sD

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks