General
-
Target
f7a315ad149382eb922905d63fcde968805e24ba9e605efefd2713452478b04f
-
Size
559KB
-
Sample
241128-fr9dlasqen
-
MD5
09cb9813e999ba59898bcba4516d5318
-
SHA1
43d6c65649a4e10def375c053a4360c166dea226
-
SHA256
f7a315ad149382eb922905d63fcde968805e24ba9e605efefd2713452478b04f
-
SHA512
725ca378bfbecf880ac0e2fbbb89b55ef55a13ecac1ad76526e6a43fd3b086798e3e4d1705aa589d0bcd1b6dd619d740a29d682442de3819de2121ca143ac036
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSs:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sly
Behavioral task
behavioral1
Sample
f7a315ad149382eb922905d63fcde968805e24ba9e605efefd2713452478b04f.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
f7a315ad149382eb922905d63fcde968805e24ba9e605efefd2713452478b04f
-
Size
559KB
-
MD5
09cb9813e999ba59898bcba4516d5318
-
SHA1
43d6c65649a4e10def375c053a4360c166dea226
-
SHA256
f7a315ad149382eb922905d63fcde968805e24ba9e605efefd2713452478b04f
-
SHA512
725ca378bfbecf880ac0e2fbbb89b55ef55a13ecac1ad76526e6a43fd3b086798e3e4d1705aa589d0bcd1b6dd619d740a29d682442de3819de2121ca143ac036
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSs:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sly
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-