General
-
Target
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe
-
Size
559KB
-
Sample
241218-cteefsylgz
-
MD5
db86ff7953f88e27c9deba1a7604d890
-
SHA1
1d750e3931966e8d569322a6cfba6d80dd045c72
-
SHA256
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585
-
SHA512
e447c0cbdac96961f0f93a4349c27783b1cb920c785e5f6897965ea0a9caa1d19dce41a62128117262103258e0f15e8e41ec540999208c5fb6b1ecdb8fceee20
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS3:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlN
Behavioral task
behavioral1
Sample
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe
-
Size
559KB
-
MD5
db86ff7953f88e27c9deba1a7604d890
-
SHA1
1d750e3931966e8d569322a6cfba6d80dd045c72
-
SHA256
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585
-
SHA512
e447c0cbdac96961f0f93a4349c27783b1cb920c785e5f6897965ea0a9caa1d19dce41a62128117262103258e0f15e8e41ec540999208c5fb6b1ecdb8fceee20
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS3:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlN
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-