General
-
Target
ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86
-
Size
3.8MB
-
Sample
250116-gq87wavrhw
-
MD5
3f97a9786bfec93a78c395e3077415e6
-
SHA1
8fe20e712b62188c12cae7fba2f4875ea01c6c8f
-
SHA256
ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86
-
SHA512
ec78ac030f5139f787ace4555ffec710ef4ceba40af49d3d0d70b1d387b6979ae1777bb2465586d72af53406cae52ca62b3326b441b77f0874137b82ff8d8fbd
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qs:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiO
Behavioral task
behavioral1
Sample
ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86
-
Size
3.8MB
-
MD5
3f97a9786bfec93a78c395e3077415e6
-
SHA1
8fe20e712b62188c12cae7fba2f4875ea01c6c8f
-
SHA256
ae309636209f4cb415f1924751e0f677a899fd96f1f64f4e025b5a57c8918e86
-
SHA512
ec78ac030f5139f787ace4555ffec710ef4ceba40af49d3d0d70b1d387b6979ae1777bb2465586d72af53406cae52ca62b3326b441b77f0874137b82ff8d8fbd
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qs:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiO
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-