General
-
Target
f301955c62ccd9c8b34db0603545c87704998ac8a86e3cb4e370d9ecc99c4e93N.exe
-
Size
559KB
-
Sample
241226-k66cpsskbn
-
MD5
79e56c6f58cc6f5896bd8c005af50c90
-
SHA1
cea6076f11e815190c985488b13363ca2c498427
-
SHA256
f301955c62ccd9c8b34db0603545c87704998ac8a86e3cb4e370d9ecc99c4e93
-
SHA512
facf275fa6f7453f2d89a6aacd7c11e246e901282592eadba3861d1e35e6656096cfc75f006900cd52e8ef5c1e8db402ec10b57e2ddf093e4e1cf2a81a9a2df4
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSJ:COEzCFaCpAYJbwzOqPUlvOsmi9c8Slj
Behavioral task
behavioral1
Sample
f301955c62ccd9c8b34db0603545c87704998ac8a86e3cb4e370d9ecc99c4e93N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f301955c62ccd9c8b34db0603545c87704998ac8a86e3cb4e370d9ecc99c4e93N.exe
-
Size
559KB
-
MD5
79e56c6f58cc6f5896bd8c005af50c90
-
SHA1
cea6076f11e815190c985488b13363ca2c498427
-
SHA256
f301955c62ccd9c8b34db0603545c87704998ac8a86e3cb4e370d9ecc99c4e93
-
SHA512
facf275fa6f7453f2d89a6aacd7c11e246e901282592eadba3861d1e35e6656096cfc75f006900cd52e8ef5c1e8db402ec10b57e2ddf093e4e1cf2a81a9a2df4
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSJ:COEzCFaCpAYJbwzOqPUlvOsmi9c8Slj
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-