General
-
Target
5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59N
-
Size
3.8MB
-
Sample
241104-yqt7dsvrdz
-
MD5
1e349275288f530d34234aa37e72d4a0
-
SHA1
67f2d33cdee5e54cc34477dcc441cc54bc6d2584
-
SHA256
5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59
-
SHA512
4e2a087495f0da2b6c6de3d25082f83cc6c5c7c2eef9a59f8a51b4300701f1139963035205bf23a0ce15b9037ee3f64dc6bb6d1b3f8057ff5b04179252a8a481
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qN:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiP
Behavioral task
behavioral1
Sample
5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59N
-
Size
3.8MB
-
MD5
1e349275288f530d34234aa37e72d4a0
-
SHA1
67f2d33cdee5e54cc34477dcc441cc54bc6d2584
-
SHA256
5784b9741f4e919bcf200b94753640ec34fe0ab10435c2b26e580c41db326e59
-
SHA512
4e2a087495f0da2b6c6de3d25082f83cc6c5c7c2eef9a59f8a51b4300701f1139963035205bf23a0ce15b9037ee3f64dc6bb6d1b3f8057ff5b04179252a8a481
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qN:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiP
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-