General
-
Target
26790a40a15ed51294738eadfc0ba540d109cadd195ea7d12c56b4fd6ef50422N.exe
-
Size
559KB
-
Sample
241120-cwp9qsykgs
-
MD5
38e231e0d35c22835aa17d526fe32150
-
SHA1
dda6917b40f8ad09266fbad549c0e2368d8c34c0
-
SHA256
26790a40a15ed51294738eadfc0ba540d109cadd195ea7d12c56b4fd6ef50422
-
SHA512
8c915daa82f13f386c749ce965159a4d8fe24197764ae571a215ed449084fdce373c229424cf30b898dfa6761253d4a670186c79b7742c7d1ebee41fbc0aea61
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoST:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlR
Behavioral task
behavioral1
Sample
26790a40a15ed51294738eadfc0ba540d109cadd195ea7d12c56b4fd6ef50422N.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
26790a40a15ed51294738eadfc0ba540d109cadd195ea7d12c56b4fd6ef50422N.exe
-
Size
559KB
-
MD5
38e231e0d35c22835aa17d526fe32150
-
SHA1
dda6917b40f8ad09266fbad549c0e2368d8c34c0
-
SHA256
26790a40a15ed51294738eadfc0ba540d109cadd195ea7d12c56b4fd6ef50422
-
SHA512
8c915daa82f13f386c749ce965159a4d8fe24197764ae571a215ed449084fdce373c229424cf30b898dfa6761253d4a670186c79b7742c7d1ebee41fbc0aea61
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoST:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlR
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-