General

  • Target

    81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1

  • Size

    304KB

  • Sample

    250207-ck9h8svmas

  • MD5

    90e6a2469d871d04bee95fca6c9e9c55

  • SHA1

    a2defc9af6b677b5940362f7f496ac54eedc58e9

  • SHA256

    81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1

  • SHA512

    922b7dee8e9f574a82cc0e96c6dd141315e0a9b32f9ce677bc2e4860c2c8296617d3ab6c79010a35fb42564ebeb1bafb0f04c1a6e6dc4826cb51221a21e57005

  • SSDEEP

    6144:XsBlY9Z0moB/jMIzk+AUygl+faCEmV34FIYxboEbo:zLAQ+A3gpmNYxboMo

Malware Config

Targets

    • Target

      81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1

    • Size

      304KB

    • MD5

      90e6a2469d871d04bee95fca6c9e9c55

    • SHA1

      a2defc9af6b677b5940362f7f496ac54eedc58e9

    • SHA256

      81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1

    • SHA512

      922b7dee8e9f574a82cc0e96c6dd141315e0a9b32f9ce677bc2e4860c2c8296617d3ab6c79010a35fb42564ebeb1bafb0f04c1a6e6dc4826cb51221a21e57005

    • SSDEEP

      6144:XsBlY9Z0moB/jMIzk+AUygl+faCEmV34FIYxboEbo:zLAQ+A3gpmNYxboMo

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Windows security bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks