General
-
Target
54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad
-
Size
576KB
-
Sample
241105-2hhp6s1blp
-
MD5
005fff98861d685b2128155a51b944bd
-
SHA1
102c0b1475775255bd3181723a831bb470209c9f
-
SHA256
54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad
-
SHA512
f4dcfd2be5eb66d7029c3358ccc5dfe7d0c74720b6ac1aaff7c9986e4e716899636a977d036d9c38cdcaf5fb6c40461b506b17d65c527f375c7202c8d98095db
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSw:+NWPkHlUfBgpuPdWzyuDTifgyWlt
Behavioral task
behavioral1
Sample
54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad
-
Size
576KB
-
MD5
005fff98861d685b2128155a51b944bd
-
SHA1
102c0b1475775255bd3181723a831bb470209c9f
-
SHA256
54d79a24b7e7d3fc30b355f6ae0673a2821b779e47fc0a25eafe9ac1376b4aad
-
SHA512
f4dcfd2be5eb66d7029c3358ccc5dfe7d0c74720b6ac1aaff7c9986e4e716899636a977d036d9c38cdcaf5fb6c40461b506b17d65c527f375c7202c8d98095db
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSw:+NWPkHlUfBgpuPdWzyuDTifgyWlt
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-