General
-
Target
bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812N.exe
-
Size
574KB
-
Sample
250224-w2gz4axmt5
-
MD5
517486e95bdd8edae32d2c5910cb4220
-
SHA1
03b791914f609f6dfed43f726944b1b8ec733624
-
SHA256
bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812
-
SHA512
01df0e58d56edce74f2c526b392bf6cf6024f3b3f84f3c70675a242b30c6de01b64eb4f749732709898e7d65d44b61d8034de34948b45951bed8ac04708deda6
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubj:zFhWAfn22m0eD1GPz8Hdxv
Static task
static1
Behavioral task
behavioral1
Sample
bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812N.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Whale
ygo.no-ip.info:1604
DC_MUTEX-KF2Q2MJ
-
gencode
YxpcQq6jqoiB
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812N.exe
-
Size
574KB
-
MD5
517486e95bdd8edae32d2c5910cb4220
-
SHA1
03b791914f609f6dfed43f726944b1b8ec733624
-
SHA256
bdc60a838ace88e943a9e6d2167fef6d7d68daff10122a20672c837d1a1ab812
-
SHA512
01df0e58d56edce74f2c526b392bf6cf6024f3b3f84f3c70675a242b30c6de01b64eb4f749732709898e7d65d44b61d8034de34948b45951bed8ac04708deda6
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsubj:zFhWAfn22m0eD1GPz8Hdxv
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-