General
-
Target
f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05.exe
-
Size
576KB
-
Sample
250121-vs8k1svlen
-
MD5
df24d2a8bddcbc375c5eafcdfdc72da7
-
SHA1
688396e78f584ae3914a7ace2bf3ff6fbf5a43a9
-
SHA256
f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05
-
SHA512
a38686ef1ed253b8bb92c9df01871dfe610fe33f4d6e3dfe7ebf8d41f9b72052e2d9f0d3011ad0caea161b43e579a9ba329e26e18dc173db24d107caa592f081
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSZ:+NWPkHlUfBgpuPdWzyuDTifgyWlo
Behavioral task
behavioral1
Sample
f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05.exe
-
Size
576KB
-
MD5
df24d2a8bddcbc375c5eafcdfdc72da7
-
SHA1
688396e78f584ae3914a7ace2bf3ff6fbf5a43a9
-
SHA256
f8c1bf72564cbf02a10a150a9f7c1a3be8afc045e6b7440cf52078fc086a2c05
-
SHA512
a38686ef1ed253b8bb92c9df01871dfe610fe33f4d6e3dfe7ebf8d41f9b72052e2d9f0d3011ad0caea161b43e579a9ba329e26e18dc173db24d107caa592f081
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSZ:+NWPkHlUfBgpuPdWzyuDTifgyWlo
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-