General
-
Target
24ffc54781f9737d530037e3ad2239c4823955dc00ce8e67b2c29195b7c972c1N
-
Size
3.8MB
-
Sample
241107-yj431sxgqk
-
MD5
e5fc9720f9fa2b5b22c86e2ca5b672f0
-
SHA1
01b06521fd81f34084865f9ad0f71df1288f7f91
-
SHA256
24ffc54781f9737d530037e3ad2239c4823955dc00ce8e67b2c29195b7c972c1
-
SHA512
bf6c70f41289b381d9846f74a72b9daf7ca4bb4e5c21cd6fdc2cee9fd9a277a550bf66a7b705b519725129d905e3bcd9bc6b2d52ff6265075c614cdcdb3806cd
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qk:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi6
Behavioral task
behavioral1
Sample
24ffc54781f9737d530037e3ad2239c4823955dc00ce8e67b2c29195b7c972c1N.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
24ffc54781f9737d530037e3ad2239c4823955dc00ce8e67b2c29195b7c972c1N
-
Size
3.8MB
-
MD5
e5fc9720f9fa2b5b22c86e2ca5b672f0
-
SHA1
01b06521fd81f34084865f9ad0f71df1288f7f91
-
SHA256
24ffc54781f9737d530037e3ad2239c4823955dc00ce8e67b2c29195b7c972c1
-
SHA512
bf6c70f41289b381d9846f74a72b9daf7ca4bb4e5c21cd6fdc2cee9fd9a277a550bf66a7b705b519725129d905e3bcd9bc6b2d52ff6265075c614cdcdb3806cd
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qk:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi6
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-