General
-
Target
c0e10b0240fcc358a594abddc89b12fcdea0227836ea186d7f6c365b4dcc6fb6.exe
-
Size
3.8MB
-
Sample
241222-qk6z1azjfy
-
MD5
95ddbf456ececcc425b90b851583cd94
-
SHA1
6fed6b7141284a594d59fc9d933cc9f0b4757e5f
-
SHA256
c0e10b0240fcc358a594abddc89b12fcdea0227836ea186d7f6c365b4dcc6fb6
-
SHA512
fa64bd31f6911484856c0a91628861629203b9fab03e84bdc4039482c9b946fc1447f40620ca72ef37bb1234dfacf21d925dbb8895684912551090f4a9667703
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXF:vJwakG4fYrq1HJvpliCQHawbzBbGSla7
Behavioral task
behavioral1
Sample
c0e10b0240fcc358a594abddc89b12fcdea0227836ea186d7f6c365b4dcc6fb6.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c0e10b0240fcc358a594abddc89b12fcdea0227836ea186d7f6c365b4dcc6fb6.exe
-
Size
3.8MB
-
MD5
95ddbf456ececcc425b90b851583cd94
-
SHA1
6fed6b7141284a594d59fc9d933cc9f0b4757e5f
-
SHA256
c0e10b0240fcc358a594abddc89b12fcdea0227836ea186d7f6c365b4dcc6fb6
-
SHA512
fa64bd31f6911484856c0a91628861629203b9fab03e84bdc4039482c9b946fc1447f40620ca72ef37bb1234dfacf21d925dbb8895684912551090f4a9667703
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXF:vJwakG4fYrq1HJvpliCQHawbzBbGSla7
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-