General
-
Target
e18e03eb69a09321c3ab90ef48a097abe37c66f72a453f43eef04bd76940b347N
-
Size
574KB
-
Sample
241031-a512gswran
-
MD5
384e50059921f8846b8f6f0364792210
-
SHA1
75d73c636a47c6fd7819ad70ed0744d98897a310
-
SHA256
e18e03eb69a09321c3ab90ef48a097abe37c66f72a453f43eef04bd76940b347
-
SHA512
6f10fe86c08297edd1a5bf71f565eb4f77e32c800263d802c562312e62a37f9a79757baa166c63b4086ef1cd16c378b023e4df28119b592dce6870812323f184
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubE:zFhWAfn22m0eD1GPz8Hdxw
Static task
static1
Behavioral task
behavioral1
Sample
e18e03eb69a09321c3ab90ef48a097abe37c66f72a453f43eef04bd76940b347N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
e18e03eb69a09321c3ab90ef48a097abe37c66f72a453f43eef04bd76940b347N
-
Size
574KB
-
MD5
384e50059921f8846b8f6f0364792210
-
SHA1
75d73c636a47c6fd7819ad70ed0744d98897a310
-
SHA256
e18e03eb69a09321c3ab90ef48a097abe37c66f72a453f43eef04bd76940b347
-
SHA512
6f10fe86c08297edd1a5bf71f565eb4f77e32c800263d802c562312e62a37f9a79757baa166c63b4086ef1cd16c378b023e4df28119b592dce6870812323f184
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubE:zFhWAfn22m0eD1GPz8Hdxw
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-