General
-
Target
00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8
-
Size
3.8MB
-
Sample
241107-xtxk9azmfp
-
MD5
29afed2251a4eb2fb408de2b55e339c1
-
SHA1
52f8d1477e704014515cc32743bdfdc9f30670ea
-
SHA256
00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8
-
SHA512
655390a44cfb73129abdd3c5de79ad57c474e426c6557adbb1f9e983380fd3ae3a9f0aae2d4f9e5f947a37488f0047694272dbecc49443875ec01fe16e5f008d
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXc:vJwakG4fYrq1HJvpliCQHawbzBbGSlaC
Behavioral task
behavioral1
Sample
00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8
-
Size
3.8MB
-
MD5
29afed2251a4eb2fb408de2b55e339c1
-
SHA1
52f8d1477e704014515cc32743bdfdc9f30670ea
-
SHA256
00a4e5e6b928f0706cb99c33cf8a8e1f766e0d64eeeecb2f72e6ebde96ca4db8
-
SHA512
655390a44cfb73129abdd3c5de79ad57c474e426c6557adbb1f9e983380fd3ae3a9f0aae2d4f9e5f947a37488f0047694272dbecc49443875ec01fe16e5f008d
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXc:vJwakG4fYrq1HJvpliCQHawbzBbGSlaC
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-