General
-
Target
624e82bf1c949636f4832ada86bd93b0eedcd0685c9237161f2e8e40c16d20d9N.exe
-
Size
3.8MB
-
Sample
250102-j7p7fasrct
-
MD5
f9545478db54c07f043b104beb6e9840
-
SHA1
857089c1f3eaf7a99fefa6444a549f94dc8bf0a5
-
SHA256
624e82bf1c949636f4832ada86bd93b0eedcd0685c9237161f2e8e40c16d20d9
-
SHA512
1d3414f883b1dde6f743417092f289af3ea6e2a734f86af69beda032be1f9668fb14baa8672d824c198d49225d8ac6002a1cec877aea4c1e58b9c922df822957
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXg:vJwakG4fYrq1HJvpliCQHawbzBbGSla+
Behavioral task
behavioral1
Sample
624e82bf1c949636f4832ada86bd93b0eedcd0685c9237161f2e8e40c16d20d9N.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
624e82bf1c949636f4832ada86bd93b0eedcd0685c9237161f2e8e40c16d20d9N.exe
-
Size
3.8MB
-
MD5
f9545478db54c07f043b104beb6e9840
-
SHA1
857089c1f3eaf7a99fefa6444a549f94dc8bf0a5
-
SHA256
624e82bf1c949636f4832ada86bd93b0eedcd0685c9237161f2e8e40c16d20d9
-
SHA512
1d3414f883b1dde6f743417092f289af3ea6e2a734f86af69beda032be1f9668fb14baa8672d824c198d49225d8ac6002a1cec877aea4c1e58b9c922df822957
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXg:vJwakG4fYrq1HJvpliCQHawbzBbGSla+
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-