General
-
Target
b272346dc64191da0db6e6a46e66c8216f92df1010e583bc05a79b7bbf294897N.exe
-
Size
559KB
-
Sample
241231-3ehfnsxlhn
-
MD5
c3e25c61f5483bd08f5a7d8c543a2950
-
SHA1
6e6957609c7cbe16ebc1af984ae4301273b177f1
-
SHA256
b272346dc64191da0db6e6a46e66c8216f92df1010e583bc05a79b7bbf294897
-
SHA512
c892e591c753014460dfaed967aab1236e5411e9340f6fac976b720600e0cbe963cc0c046d6e10338085945c52a4e2b655d9950ccedcf14a93c8ab97cbdd9048
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS+:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlM
Behavioral task
behavioral1
Sample
b272346dc64191da0db6e6a46e66c8216f92df1010e583bc05a79b7bbf294897N.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
b272346dc64191da0db6e6a46e66c8216f92df1010e583bc05a79b7bbf294897N.exe
-
Size
559KB
-
MD5
c3e25c61f5483bd08f5a7d8c543a2950
-
SHA1
6e6957609c7cbe16ebc1af984ae4301273b177f1
-
SHA256
b272346dc64191da0db6e6a46e66c8216f92df1010e583bc05a79b7bbf294897
-
SHA512
c892e591c753014460dfaed967aab1236e5411e9340f6fac976b720600e0cbe963cc0c046d6e10338085945c52a4e2b655d9950ccedcf14a93c8ab97cbdd9048
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS+:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlM
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-