General
-
Target
0a90b9a4c0bd329080ec50a0e1d70b473f384ed52bcd0c677866cc4b88965b9b.exe
-
Size
559KB
-
Sample
250122-hqn3davjeq
-
MD5
7f6bdb66decc1041e367dbf0c231d317
-
SHA1
65366e0dca3cc1dcd9e480f2d846b92534ddc5e5
-
SHA256
0a90b9a4c0bd329080ec50a0e1d70b473f384ed52bcd0c677866cc4b88965b9b
-
SHA512
d1f6a2821b68a663744678ee7e83c1eac4147e1182c011baa5db5ec2ab417d577f0ac83ad9eb2149f78e1e6b583fde4f0ba7155d08d8d75d40ed90908f5530a6
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSq:COEzCFaCpAYJbwzOqPUlvOsmi9c8Slw
Behavioral task
behavioral1
Sample
0a90b9a4c0bd329080ec50a0e1d70b473f384ed52bcd0c677866cc4b88965b9b.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
0a90b9a4c0bd329080ec50a0e1d70b473f384ed52bcd0c677866cc4b88965b9b.exe
-
Size
559KB
-
MD5
7f6bdb66decc1041e367dbf0c231d317
-
SHA1
65366e0dca3cc1dcd9e480f2d846b92534ddc5e5
-
SHA256
0a90b9a4c0bd329080ec50a0e1d70b473f384ed52bcd0c677866cc4b88965b9b
-
SHA512
d1f6a2821b68a663744678ee7e83c1eac4147e1182c011baa5db5ec2ab417d577f0ac83ad9eb2149f78e1e6b583fde4f0ba7155d08d8d75d40ed90908f5530a6
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoSq:COEzCFaCpAYJbwzOqPUlvOsmi9c8Slw
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-