General
-
Target
4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01N.exe
-
Size
589KB
-
Sample
250121-c6dcxsskaq
-
MD5
b345f448f01bd76ae15da77e85fb7440
-
SHA1
ebc2652874a10fabb92b4a2ca15b220f7187e943
-
SHA256
4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01
-
SHA512
97a8c4a976a06e2d92a5ebb7a9d2e29ef0008abbc53c5a311f47f9e1f2a2d2cfd41bb56994adb6465e98dc44b1ffee302f4f5b3f9b04c1d9d81f5014e2e8c806
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oST:9fTOIQIu7k5DzvLxm5Bl8sD
Behavioral task
behavioral1
Sample
4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01N.exe
-
Size
589KB
-
MD5
b345f448f01bd76ae15da77e85fb7440
-
SHA1
ebc2652874a10fabb92b4a2ca15b220f7187e943
-
SHA256
4e1bc485497796ae11ae05700258ff3bcff5342e2ca9ebe3ea9f854387982a01
-
SHA512
97a8c4a976a06e2d92a5ebb7a9d2e29ef0008abbc53c5a311f47f9e1f2a2d2cfd41bb56994adb6465e98dc44b1ffee302f4f5b3f9b04c1d9d81f5014e2e8c806
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oST:9fTOIQIu7k5DzvLxm5Bl8sD
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-