General
-
Target
655c10aaa3fcb1efe75739cb18238f4e938aab8d82de3fabbd4224b0966c194b.exe
-
Size
559KB
-
Sample
241218-exrv3aspev
-
MD5
88952ba56b1ab3fcf99f8c92b2ce9a3d
-
SHA1
0a464e7bf05fd2f8dad2a841b00df13ac82a04f6
-
SHA256
655c10aaa3fcb1efe75739cb18238f4e938aab8d82de3fabbd4224b0966c194b
-
SHA512
0a0d7bc168f519766bb1453dc364a35daa8d56b21f87f6c233b456f1db354ee376b7466404c1fba331feefd15f40010ef787d8ebe483634d54fa8c3cfc7ced8d
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSP:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl1
Behavioral task
behavioral1
Sample
655c10aaa3fcb1efe75739cb18238f4e938aab8d82de3fabbd4224b0966c194b.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
655c10aaa3fcb1efe75739cb18238f4e938aab8d82de3fabbd4224b0966c194b.exe
-
Size
559KB
-
MD5
88952ba56b1ab3fcf99f8c92b2ce9a3d
-
SHA1
0a464e7bf05fd2f8dad2a841b00df13ac82a04f6
-
SHA256
655c10aaa3fcb1efe75739cb18238f4e938aab8d82de3fabbd4224b0966c194b
-
SHA512
0a0d7bc168f519766bb1453dc364a35daa8d56b21f87f6c233b456f1db354ee376b7466404c1fba331feefd15f40010ef787d8ebe483634d54fa8c3cfc7ced8d
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSP:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl1
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-