General
-
Target
9122ee4e117aeb3698e030a4f3e1433a1efff2c470b02c17a913b95f3aa5da4b
-
Size
3.8MB
-
Sample
241104-cfqwbs1dkj
-
MD5
9d01ffa491b537edc13897779c5fbee1
-
SHA1
cedb8cf04f901aff80b4a4e651b53df1eb766f21
-
SHA256
9122ee4e117aeb3698e030a4f3e1433a1efff2c470b02c17a913b95f3aa5da4b
-
SHA512
c8c1c1fc915b4371714f4e1b21fdc7f61c93eb193274cefa58637aee07401368263ab784fd18e744deb518997133c1b00026485146108f3fca280fc77805f292
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qK:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiU
Behavioral task
behavioral1
Sample
9122ee4e117aeb3698e030a4f3e1433a1efff2c470b02c17a913b95f3aa5da4b.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
9122ee4e117aeb3698e030a4f3e1433a1efff2c470b02c17a913b95f3aa5da4b
-
Size
3.8MB
-
MD5
9d01ffa491b537edc13897779c5fbee1
-
SHA1
cedb8cf04f901aff80b4a4e651b53df1eb766f21
-
SHA256
9122ee4e117aeb3698e030a4f3e1433a1efff2c470b02c17a913b95f3aa5da4b
-
SHA512
c8c1c1fc915b4371714f4e1b21fdc7f61c93eb193274cefa58637aee07401368263ab784fd18e744deb518997133c1b00026485146108f3fca280fc77805f292
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qK:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiU
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-