General
-
Target
c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707N.exe
-
Size
559KB
-
Sample
241218-e2z28svjfp
-
MD5
6deec6e80d6ddd51f3d4aec7eea65ea0
-
SHA1
1e32843374a9a8c6e6a56854811c6f42c0eeb2e5
-
SHA256
c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707
-
SHA512
9c1c96c9742d64ffa7207a6646ded967e7acc73f5f119e97a2c8cd20e1100cb83053203be054e272e5456b7bf1f4bf4f898baf5fca76cc4ef4654bd4b0ece9e4
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSd:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl/
Behavioral task
behavioral1
Sample
c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707N.exe
-
Size
559KB
-
MD5
6deec6e80d6ddd51f3d4aec7eea65ea0
-
SHA1
1e32843374a9a8c6e6a56854811c6f42c0eeb2e5
-
SHA256
c3f3664217643a728556eb38255e3d0a8852716002ec23233d2d1c5f26cb7707
-
SHA512
9c1c96c9742d64ffa7207a6646ded967e7acc73f5f119e97a2c8cd20e1100cb83053203be054e272e5456b7bf1f4bf4f898baf5fca76cc4ef4654bd4b0ece9e4
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSd:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl/
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-