General
-
Target
c2341735f2cce5b39c556a1a0ebd939725d3c41d984b19de04a79abb9cac2e92.exe
-
Size
576KB
-
Sample
241204-hklp3a1qgj
-
MD5
56c43ce21981cd07d074d94b35487c7b
-
SHA1
49834cce52239abab2a22c508950f1490e304b4b
-
SHA256
c2341735f2cce5b39c556a1a0ebd939725d3c41d984b19de04a79abb9cac2e92
-
SHA512
3b67dd4f1c88b76824ebddaac47ec5709b56bb6e68de2a6268972dbd30081f2d66652e4b12c83de34e47ca822e8b064badbe0cefddd7a29aaa733358b0eb6d5d
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSv:+NWPkHlUfBgpuPdWzyuDTifgyWlo
Behavioral task
behavioral1
Sample
c2341735f2cce5b39c556a1a0ebd939725d3c41d984b19de04a79abb9cac2e92.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c2341735f2cce5b39c556a1a0ebd939725d3c41d984b19de04a79abb9cac2e92.exe
-
Size
576KB
-
MD5
56c43ce21981cd07d074d94b35487c7b
-
SHA1
49834cce52239abab2a22c508950f1490e304b4b
-
SHA256
c2341735f2cce5b39c556a1a0ebd939725d3c41d984b19de04a79abb9cac2e92
-
SHA512
3b67dd4f1c88b76824ebddaac47ec5709b56bb6e68de2a6268972dbd30081f2d66652e4b12c83de34e47ca822e8b064badbe0cefddd7a29aaa733358b0eb6d5d
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSv:+NWPkHlUfBgpuPdWzyuDTifgyWlo
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-