General
-
Target
3ef304e1620cf3af24a1c7379938ac46817682bf94ca782ca01ec9bcada7b799.exe
-
Size
576KB
-
Sample
250101-rc4qcazndp
-
MD5
6ce75d32b418bed0bed78e910cb547a1
-
SHA1
d5ae6205c47cc0d7c1196afed31e8671e7879db6
-
SHA256
3ef304e1620cf3af24a1c7379938ac46817682bf94ca782ca01ec9bcada7b799
-
SHA512
99842baea3ef61de18790955530941071c7db3e1ab76c5d085209c4538e4beb763f67d9b06f1c97aeaf313703022cd297d3e5f973604c6aa12d1d3def615c14c
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSZ:+NWPkHlUfBgpuPdWzyuDTifgyWlQ
Behavioral task
behavioral1
Sample
3ef304e1620cf3af24a1c7379938ac46817682bf94ca782ca01ec9bcada7b799.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
3ef304e1620cf3af24a1c7379938ac46817682bf94ca782ca01ec9bcada7b799.exe
-
Size
576KB
-
MD5
6ce75d32b418bed0bed78e910cb547a1
-
SHA1
d5ae6205c47cc0d7c1196afed31e8671e7879db6
-
SHA256
3ef304e1620cf3af24a1c7379938ac46817682bf94ca782ca01ec9bcada7b799
-
SHA512
99842baea3ef61de18790955530941071c7db3e1ab76c5d085209c4538e4beb763f67d9b06f1c97aeaf313703022cd297d3e5f973604c6aa12d1d3def615c14c
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSZ:+NWPkHlUfBgpuPdWzyuDTifgyWlQ
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-