General
-
Target
d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40
-
Size
574KB
-
Sample
241105-e4mjxsxkdq
-
MD5
f1fd5061244fa6098246e16dc2229c74
-
SHA1
fb914c5f6cd90bc3ea926b9b8345f18a955d0fa9
-
SHA256
d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40
-
SHA512
6c11a720ed0fbbb5553644bf962f6691b0f30a6ddf0a1a9f0b1ffb3a496f9c49543cb81669a14f90a994946ce9e842ede2f1d3c0f4fe2c090089dc0a122a6e00
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubb:zFhWAfn22m0eD1GPz8HdxP
Static task
static1
Behavioral task
behavioral1
Sample
d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40
-
Size
574KB
-
MD5
f1fd5061244fa6098246e16dc2229c74
-
SHA1
fb914c5f6cd90bc3ea926b9b8345f18a955d0fa9
-
SHA256
d94c952ebbb0b9f262f468e0fd80785bbcc5b2ce938606a594d434b3a086fe40
-
SHA512
6c11a720ed0fbbb5553644bf962f6691b0f30a6ddf0a1a9f0b1ffb3a496f9c49543cb81669a14f90a994946ce9e842ede2f1d3c0f4fe2c090089dc0a122a6e00
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubb:zFhWAfn22m0eD1GPz8HdxP
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-