General
-
Target
887818bbbc8b40494907cb1cc3555cee63f5b8c13476f2d2a035170b9a48339f.exe
-
Size
574KB
-
Sample
250225-agm5qawrt8
-
MD5
a250f6aedfdebb04efee63aa3fd5cd99
-
SHA1
d20610ca9c26d4a14d3e79adc57503f14aedf924
-
SHA256
887818bbbc8b40494907cb1cc3555cee63f5b8c13476f2d2a035170b9a48339f
-
SHA512
5f074651b7aa3fd126b39b471c2b86c7c2bdf33360ef6b36cc118f33cb6c8313dc96de3bbbbe431012e1c2acf287e6e0d329ade06e22757a080cde7bb4a1e692
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubZ:zFhWAfn22m0eD1GPz8Hdxd
Static task
static1
Behavioral task
behavioral1
Sample
887818bbbc8b40494907cb1cc3555cee63f5b8c13476f2d2a035170b9a48339f.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Whale
ygo.no-ip.info:1604
DC_MUTEX-KF2Q2MJ
-
gencode
YxpcQq6jqoiB
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
887818bbbc8b40494907cb1cc3555cee63f5b8c13476f2d2a035170b9a48339f.exe
-
Size
574KB
-
MD5
a250f6aedfdebb04efee63aa3fd5cd99
-
SHA1
d20610ca9c26d4a14d3e79adc57503f14aedf924
-
SHA256
887818bbbc8b40494907cb1cc3555cee63f5b8c13476f2d2a035170b9a48339f
-
SHA512
5f074651b7aa3fd126b39b471c2b86c7c2bdf33360ef6b36cc118f33cb6c8313dc96de3bbbbe431012e1c2acf287e6e0d329ade06e22757a080cde7bb4a1e692
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubZ:zFhWAfn22m0eD1GPz8Hdxd
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-