General
-
Target
e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3cN.exe
-
Size
3.8MB
-
Sample
241222-bg171sxjes
-
MD5
ffedc93f2dc178fa2835db6fb56cc080
-
SHA1
d21c470d84d3a3338e2d32cd3e52b93dcb85262c
-
SHA256
e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3c
-
SHA512
054a94cd1efc6c2a8950551111b4df454b8651b639d467502365e2121d0ccce3177d84078dff36d1dec508f6dd71c6aa846be7e83258abacd7b75e002462cc93
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXd:vJwakG4fYrq1HJvpliCQHawbzBbGSlaj
Behavioral task
behavioral1
Sample
e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3cN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3cN.exe
-
Size
3.8MB
-
MD5
ffedc93f2dc178fa2835db6fb56cc080
-
SHA1
d21c470d84d3a3338e2d32cd3e52b93dcb85262c
-
SHA256
e7b425cf7f619348e736ad36cbc5b954dd4f7167d7e3bb6eee50cfda0a172e3c
-
SHA512
054a94cd1efc6c2a8950551111b4df454b8651b639d467502365e2121d0ccce3177d84078dff36d1dec508f6dd71c6aa846be7e83258abacd7b75e002462cc93
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXd:vJwakG4fYrq1HJvpliCQHawbzBbGSlaj
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-