General
-
Target
5bb855d5a99607884dcbe6eb24e859da01e138fe93b9db3ac60000c6666490e0.exe
-
Size
576KB
-
Sample
241218-bzxybawrdy
-
MD5
634b3b667463eb68a80151623408bc02
-
SHA1
7d31d1df8a96c846d5b04de5a5435e38561d26d3
-
SHA256
5bb855d5a99607884dcbe6eb24e859da01e138fe93b9db3ac60000c6666490e0
-
SHA512
eec6928fa0f431882ac0818b93924dc010e657cfcff5411c13c1659832109976d6d851be5f877152760f13a5e5c32f134147b7604ab872f287cb0eb67fd7d5ca
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSK:+NWPkHlUfBgpuPdWzyuDTifgyWl1
Behavioral task
behavioral1
Sample
5bb855d5a99607884dcbe6eb24e859da01e138fe93b9db3ac60000c6666490e0.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
5bb855d5a99607884dcbe6eb24e859da01e138fe93b9db3ac60000c6666490e0.exe
-
Size
576KB
-
MD5
634b3b667463eb68a80151623408bc02
-
SHA1
7d31d1df8a96c846d5b04de5a5435e38561d26d3
-
SHA256
5bb855d5a99607884dcbe6eb24e859da01e138fe93b9db3ac60000c6666490e0
-
SHA512
eec6928fa0f431882ac0818b93924dc010e657cfcff5411c13c1659832109976d6d851be5f877152760f13a5e5c32f134147b7604ab872f287cb0eb67fd7d5ca
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSK:+NWPkHlUfBgpuPdWzyuDTifgyWl1
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-