General
-
Target
cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280N.exe
-
Size
3.8MB
-
Sample
250104-nfzn1sxkat
-
MD5
b1f861214980af5ccda8662cf97c7270
-
SHA1
6dbc6d1d51a38fc2288af390562ebf1f4a52905a
-
SHA256
cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280
-
SHA512
a3371bf3cab6ce626dd8867005189528772a8829d4dceaf840eb70a7f71aa3285392ca6515415f5dd922517e2ff271d82e377e5bafbcbc32fa10ba90f8497a02
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qO:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi4
Behavioral task
behavioral1
Sample
cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280N.exe
-
Size
3.8MB
-
MD5
b1f861214980af5ccda8662cf97c7270
-
SHA1
6dbc6d1d51a38fc2288af390562ebf1f4a52905a
-
SHA256
cb9f8102e21dbff3c587e8ad17913f6f466ce1756bd8a11e56186b368a230280
-
SHA512
a3371bf3cab6ce626dd8867005189528772a8829d4dceaf840eb70a7f71aa3285392ca6515415f5dd922517e2ff271d82e377e5bafbcbc32fa10ba90f8497a02
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qO:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi4
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-