General
-
Target
bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90a
-
Size
576KB
-
Sample
241217-c5j43sypcm
-
MD5
c10a0c7f2d4093984324341c8947dfd0
-
SHA1
edf40e1940938e46eeec1df5f9866c10b9ac39a2
-
SHA256
bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90a
-
SHA512
1c74b4ad5b84b55a258dde7b4e661a3e685d1a11456a8bee1320fe28500d69cf0521085e3013bc0da40f33ca135541af331f01edf09ea1bae89fdb7f1b1937a2
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSO:+NWPkHlUfBgpuPdWzyuDTifgyWlv
Behavioral task
behavioral1
Sample
bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90a.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90a
-
Size
576KB
-
MD5
c10a0c7f2d4093984324341c8947dfd0
-
SHA1
edf40e1940938e46eeec1df5f9866c10b9ac39a2
-
SHA256
bfc2324ddd5fd33c825bae046d89fe4f3ef80c929cfca0ae093d451eca61e90a
-
SHA512
1c74b4ad5b84b55a258dde7b4e661a3e685d1a11456a8bee1320fe28500d69cf0521085e3013bc0da40f33ca135541af331f01edf09ea1bae89fdb7f1b1937a2
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSO:+NWPkHlUfBgpuPdWzyuDTifgyWlv
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-