General
-
Target
dca7f803c64d843e64c8bdfe515b02746caf82d2c44f92bc275077af56b7a7d0N.exe
-
Size
589KB
-
Sample
250103-pga8gstjdx
-
MD5
7d57575fe8124d51e6d13d66c58c25a0
-
SHA1
45f3c10d8b7e10fba9db6bd522f3a8ae04546ecd
-
SHA256
dca7f803c64d843e64c8bdfe515b02746caf82d2c44f92bc275077af56b7a7d0
-
SHA512
53ee167f71ad917a4516fc139f5dab275dcdf9b26f6fd17d40fabbacf9b1f57e1524b9f765ee9fe65b4c7892f89bbd5da071a9c5988c6098c8d0954bb3f312bb
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSv:9fTOIQIu7k5DzvLxm5Bl8sf
Behavioral task
behavioral1
Sample
dca7f803c64d843e64c8bdfe515b02746caf82d2c44f92bc275077af56b7a7d0N.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
dca7f803c64d843e64c8bdfe515b02746caf82d2c44f92bc275077af56b7a7d0N.exe
-
Size
589KB
-
MD5
7d57575fe8124d51e6d13d66c58c25a0
-
SHA1
45f3c10d8b7e10fba9db6bd522f3a8ae04546ecd
-
SHA256
dca7f803c64d843e64c8bdfe515b02746caf82d2c44f92bc275077af56b7a7d0
-
SHA512
53ee167f71ad917a4516fc139f5dab275dcdf9b26f6fd17d40fabbacf9b1f57e1524b9f765ee9fe65b4c7892f89bbd5da071a9c5988c6098c8d0954bb3f312bb
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSv:9fTOIQIu7k5DzvLxm5Bl8sf
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-