General
-
Target
48e5a4a16442945adb5523b5ea5bd19d71a1eb8c5d66e7ec92f0999b8e37dcce
-
Size
576KB
-
Sample
241122-163jta1jes
-
MD5
17a42b598995a90a25ff48f92c133bf7
-
SHA1
3012b547e187ebfbd8399e8576bc56eba49bfa3e
-
SHA256
48e5a4a16442945adb5523b5ea5bd19d71a1eb8c5d66e7ec92f0999b8e37dcce
-
SHA512
7a981fcddcd0af1fe0131e3b28c569fc2310c0fa20f2b83f06de69f1c873410bc7768f31c4942d252b8fe7cfaad03378282a9c4d7ae2b2458db3365a76e8ff00
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoS8:+NWPkHlUfBgpuPdWzyuDTifgyWlL
Behavioral task
behavioral1
Sample
48e5a4a16442945adb5523b5ea5bd19d71a1eb8c5d66e7ec92f0999b8e37dcce.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
48e5a4a16442945adb5523b5ea5bd19d71a1eb8c5d66e7ec92f0999b8e37dcce
-
Size
576KB
-
MD5
17a42b598995a90a25ff48f92c133bf7
-
SHA1
3012b547e187ebfbd8399e8576bc56eba49bfa3e
-
SHA256
48e5a4a16442945adb5523b5ea5bd19d71a1eb8c5d66e7ec92f0999b8e37dcce
-
SHA512
7a981fcddcd0af1fe0131e3b28c569fc2310c0fa20f2b83f06de69f1c873410bc7768f31c4942d252b8fe7cfaad03378282a9c4d7ae2b2458db3365a76e8ff00
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoS8:+NWPkHlUfBgpuPdWzyuDTifgyWlL
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-