General
-
Target
0c14dea2568e99dfc11a267dd9bdaa988c8c9abd17eb8c91589eda42c6772121.exe
-
Size
559KB
-
Sample
241127-ycp1hsxkfw
-
MD5
e978aa8929c950781c6b9675275cf5dd
-
SHA1
5555805864d1d8d82f51555024553013d9b6459c
-
SHA256
0c14dea2568e99dfc11a267dd9bdaa988c8c9abd17eb8c91589eda42c6772121
-
SHA512
4c09e250811f1b9a48f4472e3094e9d41f7fc0d67a533f1745d69cc8f70f2d46097b3c209acfebfd277feb976339f6bac2e39b0610ca57315097d81810893304
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSj:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl5
Behavioral task
behavioral1
Sample
0c14dea2568e99dfc11a267dd9bdaa988c8c9abd17eb8c91589eda42c6772121.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
0c14dea2568e99dfc11a267dd9bdaa988c8c9abd17eb8c91589eda42c6772121.exe
-
Size
559KB
-
MD5
e978aa8929c950781c6b9675275cf5dd
-
SHA1
5555805864d1d8d82f51555024553013d9b6459c
-
SHA256
0c14dea2568e99dfc11a267dd9bdaa988c8c9abd17eb8c91589eda42c6772121
-
SHA512
4c09e250811f1b9a48f4472e3094e9d41f7fc0d67a533f1745d69cc8f70f2d46097b3c209acfebfd277feb976339f6bac2e39b0610ca57315097d81810893304
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSj:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl5
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-