General
-
Target
5cdcc9bc320db5d7d14d1c91fd83c8d3e73c20a3a27623dd0369a3abdbf382b2
-
Size
576KB
-
Sample
241126-3q4s2sslhm
-
MD5
a70261e8a99584e1f7413de33e6ca773
-
SHA1
6abc049ab5c57634dea75b635abbf36696a32e13
-
SHA256
5cdcc9bc320db5d7d14d1c91fd83c8d3e73c20a3a27623dd0369a3abdbf382b2
-
SHA512
176b200befbd3f9a1235c0aa1e838eb56c405bacaf9f6b5321cc11bd31474cd9ba1bcce7403335208a9a17193e3c70bd656334a1f827f5bff840613ea0bc519e
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoS8:+NWPkHlUfBgpuPdWzyuDTifgyWl1
Behavioral task
behavioral1
Sample
5cdcc9bc320db5d7d14d1c91fd83c8d3e73c20a3a27623dd0369a3abdbf382b2.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
5cdcc9bc320db5d7d14d1c91fd83c8d3e73c20a3a27623dd0369a3abdbf382b2
-
Size
576KB
-
MD5
a70261e8a99584e1f7413de33e6ca773
-
SHA1
6abc049ab5c57634dea75b635abbf36696a32e13
-
SHA256
5cdcc9bc320db5d7d14d1c91fd83c8d3e73c20a3a27623dd0369a3abdbf382b2
-
SHA512
176b200befbd3f9a1235c0aa1e838eb56c405bacaf9f6b5321cc11bd31474cd9ba1bcce7403335208a9a17193e3c70bd656334a1f827f5bff840613ea0bc519e
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoS8:+NWPkHlUfBgpuPdWzyuDTifgyWl1
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-