General

  • Target

    f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05.exe

  • Size

    576KB

  • Sample

    250121-vqmkrsvkcl

  • MD5

    df24d2a8bddcbc375c5eafcdfdc72da7

  • SHA1

    688396e78f584ae3914a7ace2bf3ff6fbf5a43a9

  • SHA256

    f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05

  • SHA512

    a38686ef1ed253b8bb92c9df01871dfe610fe33f4d6e3dfe7ebf8d41f9b72052e2d9f0d3011ad0caea161b43e579a9ba329e26e18dc173db24d107caa592f081

  • SSDEEP

    12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSZ:+NWPkHlUfBgpuPdWzyuDTifgyWlo

Malware Config

Targets

    • Target

      f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05.exe

    • Size

      576KB

    • MD5

      df24d2a8bddcbc375c5eafcdfdc72da7

    • SHA1

      688396e78f584ae3914a7ace2bf3ff6fbf5a43a9

    • SHA256

      f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05

    • SHA512

      a38686ef1ed253b8bb92c9df01871dfe610fe33f4d6e3dfe7ebf8d41f9b72052e2d9f0d3011ad0caea161b43e579a9ba329e26e18dc173db24d107caa592f081

    • SSDEEP

      12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSZ:+NWPkHlUfBgpuPdWzyuDTifgyWlo

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks