General
-
Target
b12db3eb00b7e94f1e2128cbd0b22d11f70c0cc770bfa31e760e707fb786ae83N.exe
-
Size
576KB
-
Sample
241203-mh7xqswrep
-
MD5
99243b96a71d5822cd2e9830c61bc0a0
-
SHA1
d0925bfbf343c5eb0ccdb7ea854f9a73de0f358e
-
SHA256
b12db3eb00b7e94f1e2128cbd0b22d11f70c0cc770bfa31e760e707fb786ae83
-
SHA512
22521251c5872c70e02d18c908fc95d19f46e73afe4937c1e07b2200dea91a64535e38345b16d37b5279cfe2b894a03b629421340b5b30655c74fcdf5a929fb8
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSv:+NWPkHlUfBgpuPdWzyuDTifgyWlo
Behavioral task
behavioral1
Sample
b12db3eb00b7e94f1e2128cbd0b22d11f70c0cc770bfa31e760e707fb786ae83N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b12db3eb00b7e94f1e2128cbd0b22d11f70c0cc770bfa31e760e707fb786ae83N.exe
-
Size
576KB
-
MD5
99243b96a71d5822cd2e9830c61bc0a0
-
SHA1
d0925bfbf343c5eb0ccdb7ea854f9a73de0f358e
-
SHA256
b12db3eb00b7e94f1e2128cbd0b22d11f70c0cc770bfa31e760e707fb786ae83
-
SHA512
22521251c5872c70e02d18c908fc95d19f46e73afe4937c1e07b2200dea91a64535e38345b16d37b5279cfe2b894a03b629421340b5b30655c74fcdf5a929fb8
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSv:+NWPkHlUfBgpuPdWzyuDTifgyWlo
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-