General
-
Target
b6a28bc8e0b60a4c9fcc7978755bf9a2085bdcca025e13d04b21beea4f7096ceN.exe
-
Size
576KB
-
Sample
250103-q2f5xazmbq
-
MD5
c98a496cbab8c3521abcd832dcf368c0
-
SHA1
38b0b63ed6bdbadb4cc0682a1be2901d23a03cc8
-
SHA256
b6a28bc8e0b60a4c9fcc7978755bf9a2085bdcca025e13d04b21beea4f7096ce
-
SHA512
d4ff9c0cc2447a22e47f4c63e6b887505300dfb752a8dc688c72ccc39196e43f4a86bd86a1a4efbfef5a8012584cf76b1c69ff9071d814860156ed9ebd0e1156
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSA:+NWPkHlUfBgpuPdWzyuDTifgyWlX
Behavioral task
behavioral1
Sample
b6a28bc8e0b60a4c9fcc7978755bf9a2085bdcca025e13d04b21beea4f7096ceN.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
b6a28bc8e0b60a4c9fcc7978755bf9a2085bdcca025e13d04b21beea4f7096ceN.exe
-
Size
576KB
-
MD5
c98a496cbab8c3521abcd832dcf368c0
-
SHA1
38b0b63ed6bdbadb4cc0682a1be2901d23a03cc8
-
SHA256
b6a28bc8e0b60a4c9fcc7978755bf9a2085bdcca025e13d04b21beea4f7096ce
-
SHA512
d4ff9c0cc2447a22e47f4c63e6b887505300dfb752a8dc688c72ccc39196e43f4a86bd86a1a4efbfef5a8012584cf76b1c69ff9071d814860156ed9ebd0e1156
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSA:+NWPkHlUfBgpuPdWzyuDTifgyWlX
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-