General
-
Target
2d94ca385a3d3ca80711b5849fa55e4d46756160fcf53674853ff433b71ebd0aN.exe
-
Size
559KB
-
Sample
241220-bla7dsvphz
-
MD5
304cbddf0af78fdc5190792e17a7d1d0
-
SHA1
6aaa6006284f04526fd72186f3a6cbf98e312cfe
-
SHA256
2d94ca385a3d3ca80711b5849fa55e4d46756160fcf53674853ff433b71ebd0a
-
SHA512
699fb270f160b1ec1f7e6dc8cb510e809a97ceab84481aae1465193ceb639292d2388e64c0e616659d1daa8d8baf28bda96c774f582689058a16dfc21af35d9e
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSq:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlA
Behavioral task
behavioral1
Sample
2d94ca385a3d3ca80711b5849fa55e4d46756160fcf53674853ff433b71ebd0aN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2d94ca385a3d3ca80711b5849fa55e4d46756160fcf53674853ff433b71ebd0aN.exe
-
Size
559KB
-
MD5
304cbddf0af78fdc5190792e17a7d1d0
-
SHA1
6aaa6006284f04526fd72186f3a6cbf98e312cfe
-
SHA256
2d94ca385a3d3ca80711b5849fa55e4d46756160fcf53674853ff433b71ebd0a
-
SHA512
699fb270f160b1ec1f7e6dc8cb510e809a97ceab84481aae1465193ceb639292d2388e64c0e616659d1daa8d8baf28bda96c774f582689058a16dfc21af35d9e
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSq:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlA
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-