General
-
Target
345f84d6cc6b12c209a735ec5257e95af7754b093493c2407a9b9f5ada42c4c2N.exe
-
Size
576KB
-
Sample
241226-rheneaxlcv
-
MD5
968438543ff8dceba07313af87f0d160
-
SHA1
36359d5302411ac47400139f15c58efc569fcb00
-
SHA256
345f84d6cc6b12c209a735ec5257e95af7754b093493c2407a9b9f5ada42c4c2
-
SHA512
553017b2f1752d430773c4f44d4be81cec47a6466ed263636047a8e9c78a7b2cad8706f00aa78065b6a8fc8ea690266ebe651e97e5d5cc45154366e9ccb79063
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSz:+NWPkHlUfBgpuPdWzyuDTifgyWlk
Behavioral task
behavioral1
Sample
345f84d6cc6b12c209a735ec5257e95af7754b093493c2407a9b9f5ada42c4c2N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
345f84d6cc6b12c209a735ec5257e95af7754b093493c2407a9b9f5ada42c4c2N.exe
-
Size
576KB
-
MD5
968438543ff8dceba07313af87f0d160
-
SHA1
36359d5302411ac47400139f15c58efc569fcb00
-
SHA256
345f84d6cc6b12c209a735ec5257e95af7754b093493c2407a9b9f5ada42c4c2
-
SHA512
553017b2f1752d430773c4f44d4be81cec47a6466ed263636047a8e9c78a7b2cad8706f00aa78065b6a8fc8ea690266ebe651e97e5d5cc45154366e9ccb79063
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSz:+NWPkHlUfBgpuPdWzyuDTifgyWlk
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-