General
-
Target
c68ea7173955afefa33593390a95c255617d2c0091888fcc8879e6cb24cb6278
-
Size
3.8MB
-
Sample
241110-c32aksxfml
-
MD5
7c014cf0f811cbfad39a03872625121a
-
SHA1
e59c857fee86d93bf009855e112b02d08665e100
-
SHA256
c68ea7173955afefa33593390a95c255617d2c0091888fcc8879e6cb24cb6278
-
SHA512
7aeda38555bf4c5e672f77b1fda33fd59e6657a2b6d98e2b7075689282cfe5e7bb327a551a9812bbf08d0fe08b66e3c210087ea5dfe64815a700b9edb51c802c
-
SSDEEP
98304:cJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwX0:cJwakG4fYrq1HJvpliCQHawbzBbGSlaa
Behavioral task
behavioral1
Sample
c68ea7173955afefa33593390a95c255617d2c0091888fcc8879e6cb24cb6278.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c68ea7173955afefa33593390a95c255617d2c0091888fcc8879e6cb24cb6278
-
Size
3.8MB
-
MD5
7c014cf0f811cbfad39a03872625121a
-
SHA1
e59c857fee86d93bf009855e112b02d08665e100
-
SHA256
c68ea7173955afefa33593390a95c255617d2c0091888fcc8879e6cb24cb6278
-
SHA512
7aeda38555bf4c5e672f77b1fda33fd59e6657a2b6d98e2b7075689282cfe5e7bb327a551a9812bbf08d0fe08b66e3c210087ea5dfe64815a700b9edb51c802c
-
SSDEEP
98304:cJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwX0:cJwakG4fYrq1HJvpliCQHawbzBbGSlaa
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-