General
-
Target
6c1415a50022429cfd6f556e388ed02dafad0da3b62a0410c7415f9e12c788b7.exe
-
Size
3.8MB
-
Sample
241118-b13j7avjhv
-
MD5
3e88b0e5b68aa272b984a52cc1e7d728
-
SHA1
70ba6e881e63cb609c189e2a54408ee52612fcff
-
SHA256
6c1415a50022429cfd6f556e388ed02dafad0da3b62a0410c7415f9e12c788b7
-
SHA512
ab3eca26be48b5fc46eb599c889593652b70aaf05da9cd4f8349e1d8914222d88caf3c7d3c4d4f3818630ddbf68bc8b96c10bb721b141ee37082155ce0484ca0
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/q5:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi7
Behavioral task
behavioral1
Sample
6c1415a50022429cfd6f556e388ed02dafad0da3b62a0410c7415f9e12c788b7.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
6c1415a50022429cfd6f556e388ed02dafad0da3b62a0410c7415f9e12c788b7.exe
-
Size
3.8MB
-
MD5
3e88b0e5b68aa272b984a52cc1e7d728
-
SHA1
70ba6e881e63cb609c189e2a54408ee52612fcff
-
SHA256
6c1415a50022429cfd6f556e388ed02dafad0da3b62a0410c7415f9e12c788b7
-
SHA512
ab3eca26be48b5fc46eb599c889593652b70aaf05da9cd4f8349e1d8914222d88caf3c7d3c4d4f3818630ddbf68bc8b96c10bb721b141ee37082155ce0484ca0
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/q5:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi7
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-