General
-
Target
8f58a508d5f6173b7894ad72cda79961b74b66a0e7e5b809d0eaf093a9f6a221N
-
Size
574KB
-
Sample
241028-zyy1zsvpfj
-
MD5
c4513af27483655fb2712768c3091b00
-
SHA1
d18b248c14668cd10ddf6e6519be39736fa9acc2
-
SHA256
8f58a508d5f6173b7894ad72cda79961b74b66a0e7e5b809d0eaf093a9f6a221
-
SHA512
4ee62f9287edf0274d749573fe2cc811905bf8f7d9163dc936ea73e3f4347c2204d9eb6e45f2d936651f9f704dd9813242beedb0e827717a7cfc1a6def2dd8b2
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubm:zFhWAfn22m0eD1GPz8Hdxy
Static task
static1
Behavioral task
behavioral1
Sample
8f58a508d5f6173b7894ad72cda79961b74b66a0e7e5b809d0eaf093a9f6a221N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
8f58a508d5f6173b7894ad72cda79961b74b66a0e7e5b809d0eaf093a9f6a221N
-
Size
574KB
-
MD5
c4513af27483655fb2712768c3091b00
-
SHA1
d18b248c14668cd10ddf6e6519be39736fa9acc2
-
SHA256
8f58a508d5f6173b7894ad72cda79961b74b66a0e7e5b809d0eaf093a9f6a221
-
SHA512
4ee62f9287edf0274d749573fe2cc811905bf8f7d9163dc936ea73e3f4347c2204d9eb6e45f2d936651f9f704dd9813242beedb0e827717a7cfc1a6def2dd8b2
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubm:zFhWAfn22m0eD1GPz8Hdxy
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-