General
-
Target
1dff388a94114268eac691658a947853f16bba4d18a7c75b65680b8c827a39d7
-
Size
3.9MB
-
Sample
241231-yyn1cazkdj
-
MD5
201f1800b9e65be9b59000b273abdf35
-
SHA1
bd49ed397d9f6c6919668cd0865a09500e1ae139
-
SHA256
1dff388a94114268eac691658a947853f16bba4d18a7c75b65680b8c827a39d7
-
SHA512
60cc3c754d0c7bec38703e0cd01e2ebba1f3a1a7a541df392ee8c1295bc7a25d392d85a59bf555b51e72f16031c68e350756406de0bc82ecbcf3c6903aca5ab2
-
SSDEEP
98304:8lX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBAlB6D4tyX6kuT4IkQApCgvms0Cv05J5Ct:8lX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBt
Static task
static1
Behavioral task
behavioral1
Sample
1dff388a94114268eac691658a947853f16bba4d18a7c75b65680b8c827a39d7.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
1dff388a94114268eac691658a947853f16bba4d18a7c75b65680b8c827a39d7
-
Size
3.9MB
-
MD5
201f1800b9e65be9b59000b273abdf35
-
SHA1
bd49ed397d9f6c6919668cd0865a09500e1ae139
-
SHA256
1dff388a94114268eac691658a947853f16bba4d18a7c75b65680b8c827a39d7
-
SHA512
60cc3c754d0c7bec38703e0cd01e2ebba1f3a1a7a541df392ee8c1295bc7a25d392d85a59bf555b51e72f16031c68e350756406de0bc82ecbcf3c6903aca5ab2
-
SSDEEP
98304:8lX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBAlB6D4tyX6kuT4IkQApCgvms0Cv05J5Ct:8lX3KMj7yBNUVPhd5G0Z5DxdM3hZpmBt
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-