General
-
Target
2839390476bc228835339d898ce2e43dd53cc5296adc279b8da3a42e49cf3483
-
Size
576KB
-
Sample
241124-zq3n7svnhp
-
MD5
f76823f0e2580a552d203afc3beba5c2
-
SHA1
6a02c33735108513aa5613fffe36f9de0b25101b
-
SHA256
2839390476bc228835339d898ce2e43dd53cc5296adc279b8da3a42e49cf3483
-
SHA512
1187056e2157b1df681ec4ed85c0a0194d565290385bac85b77cccb8a5fd6ee14cf9479001c9ca65b4acc9f2ddca63eae895b52d44f6cbfb3d4c2d0b8738d4d1
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSO:+NWPkHlUfBgpuPdWzyuDTifgyWl/
Behavioral task
behavioral1
Sample
2839390476bc228835339d898ce2e43dd53cc5296adc279b8da3a42e49cf3483.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2839390476bc228835339d898ce2e43dd53cc5296adc279b8da3a42e49cf3483
-
Size
576KB
-
MD5
f76823f0e2580a552d203afc3beba5c2
-
SHA1
6a02c33735108513aa5613fffe36f9de0b25101b
-
SHA256
2839390476bc228835339d898ce2e43dd53cc5296adc279b8da3a42e49cf3483
-
SHA512
1187056e2157b1df681ec4ed85c0a0194d565290385bac85b77cccb8a5fd6ee14cf9479001c9ca65b4acc9f2ddca63eae895b52d44f6cbfb3d4c2d0b8738d4d1
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSO:+NWPkHlUfBgpuPdWzyuDTifgyWl/
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-