General
-
Target
7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb.exe
-
Size
559KB
-
Sample
241205-fqqj4awldm
-
MD5
c576239f3d7d7c32e483a2761d53ea2c
-
SHA1
f8360f82db77b5e8babd7ad9874259f10bdcf7a3
-
SHA256
7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb
-
SHA512
3456a3c7d9e3081ed75f0f3dcdc1d3a083d45fa68eeaeab6ef01a84087b1d7357f7c3dd60025529d23fb39b8a12557b30f1b4b757b9d51ca8b1f46b9631010ce
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS8:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl+
Behavioral task
behavioral1
Sample
7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb.exe
-
Size
559KB
-
MD5
c576239f3d7d7c32e483a2761d53ea2c
-
SHA1
f8360f82db77b5e8babd7ad9874259f10bdcf7a3
-
SHA256
7ffcbf19077c6fbfed1c632fd3c6dbcad6d674849d2d14367d7b34b252ab1bcb
-
SHA512
3456a3c7d9e3081ed75f0f3dcdc1d3a083d45fa68eeaeab6ef01a84087b1d7357f7c3dd60025529d23fb39b8a12557b30f1b4b757b9d51ca8b1f46b9631010ce
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS8:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl+
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-