General
-
Target
4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295N.exe
-
Size
576KB
-
Sample
241216-emm45avlcm
-
MD5
9f7d633ce5a8f7841f1d36234f57aa40
-
SHA1
bd9c9496dd3694157681066d56815e7192498593
-
SHA256
4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295
-
SHA512
2aa3c6f21c3ce2468241f55eaee51b7f5c1c7f111e4e4a663137c1c4483d2f700afd320a0891a040fc0f6f2c968ce9d9c953fed33aa6241724db1510b2bc3be5
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSQ:+NWPkHlUfBgpuPdWzyuDTifgyWln
Behavioral task
behavioral1
Sample
4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295N.exe
-
Size
576KB
-
MD5
9f7d633ce5a8f7841f1d36234f57aa40
-
SHA1
bd9c9496dd3694157681066d56815e7192498593
-
SHA256
4b1a758a8604484cd4cdc381ea522eb22942cc1d3271be7d8c61c0a28e470295
-
SHA512
2aa3c6f21c3ce2468241f55eaee51b7f5c1c7f111e4e4a663137c1c4483d2f700afd320a0891a040fc0f6f2c968ce9d9c953fed33aa6241724db1510b2bc3be5
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSQ:+NWPkHlUfBgpuPdWzyuDTifgyWln
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-