General
-
Target
5a153fbd6e42b3c15c4a52b9ba1bf688ade2148921d10a08314b17173dbdbb99.exe
-
Size
559KB
-
Sample
241230-wdej3a1qgj
-
MD5
71e81da5d572dd1732a7162ec2e40f12
-
SHA1
43e9a6c348c20e9ab5b647893828610174ae42fa
-
SHA256
5a153fbd6e42b3c15c4a52b9ba1bf688ade2148921d10a08314b17173dbdbb99
-
SHA512
0570a7c5c40c98cffe2305f8be1537c01fa521cae1787071740b95ff78a01cab11ac96b96ac6f33e3e6a9b8450841807d42927fc01296cfe9f21585d311a85f9
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSK:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl0
Behavioral task
behavioral1
Sample
5a153fbd6e42b3c15c4a52b9ba1bf688ade2148921d10a08314b17173dbdbb99.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
5a153fbd6e42b3c15c4a52b9ba1bf688ade2148921d10a08314b17173dbdbb99.exe
-
Size
559KB
-
MD5
71e81da5d572dd1732a7162ec2e40f12
-
SHA1
43e9a6c348c20e9ab5b647893828610174ae42fa
-
SHA256
5a153fbd6e42b3c15c4a52b9ba1bf688ade2148921d10a08314b17173dbdbb99
-
SHA512
0570a7c5c40c98cffe2305f8be1537c01fa521cae1787071740b95ff78a01cab11ac96b96ac6f33e3e6a9b8450841807d42927fc01296cfe9f21585d311a85f9
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSK:COEzCFaCpAYJbwzOqPUlvOsmi9c8Sl0
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-