General
-
Target
21fc136d129a38f2e77543eac002391c9b430405af5580ba9e067f484c66b36b
-
Size
3.8MB
-
Sample
241106-zhdecawqdv
-
MD5
34cd5816e7ef1cd87d916d4a282df5b1
-
SHA1
9301f7dd595356e74aca949900ca1ec60455e512
-
SHA256
21fc136d129a38f2e77543eac002391c9b430405af5580ba9e067f484c66b36b
-
SHA512
dad6a563b8b80233b38ec96c135b0f48ed7a6169dee8522f947afc08177cc440a73c8d1a0443e030595e4a911bd03176fc8dcfd64b396e91d2711f94441cbd36
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXp:vJwakG4fYrq1HJvpliCQHawbzBbGSla3
Behavioral task
behavioral1
Sample
21fc136d129a38f2e77543eac002391c9b430405af5580ba9e067f484c66b36b.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
21fc136d129a38f2e77543eac002391c9b430405af5580ba9e067f484c66b36b
-
Size
3.8MB
-
MD5
34cd5816e7ef1cd87d916d4a282df5b1
-
SHA1
9301f7dd595356e74aca949900ca1ec60455e512
-
SHA256
21fc136d129a38f2e77543eac002391c9b430405af5580ba9e067f484c66b36b
-
SHA512
dad6a563b8b80233b38ec96c135b0f48ed7a6169dee8522f947afc08177cc440a73c8d1a0443e030595e4a911bd03176fc8dcfd64b396e91d2711f94441cbd36
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXp:vJwakG4fYrq1HJvpliCQHawbzBbGSla3
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-