General
-
Target
4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d
-
Size
589KB
-
Sample
250102-2rv2vssjcq
-
MD5
d3897ba54f556a71936e1028c40e092c
-
SHA1
4c2ffb75cea1c906eaff076406c4e917f21fd459
-
SHA256
4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d
-
SHA512
c8a20733d173fdce060b3baad8ee035b5cf1fee7a63ad6fb8cdb7f7bf5db3a50e12e17322581196e1b294bbb751c9cdeca6a1624f660bcae1d131cf938e106f0
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSX:9fTOIQIu7k5DzvLxm5Bl8sH
Behavioral task
behavioral1
Sample
4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d
-
Size
589KB
-
MD5
d3897ba54f556a71936e1028c40e092c
-
SHA1
4c2ffb75cea1c906eaff076406c4e917f21fd459
-
SHA256
4f26e70c7e309f54cb1b41511a649c04969d34048154278fe63749951edfbd7d
-
SHA512
c8a20733d173fdce060b3baad8ee035b5cf1fee7a63ad6fb8cdb7f7bf5db3a50e12e17322581196e1b294bbb751c9cdeca6a1624f660bcae1d131cf938e106f0
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSX:9fTOIQIu7k5DzvLxm5Bl8sH
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-