General
-
Target
48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69N.exe
-
Size
576KB
-
Sample
250323-f9grasvls3
-
MD5
df697cf4cfada8ea190ec0b241f77180
-
SHA1
d0eaea95cf2e772f65d730bf2b8854fea0f69b0a
-
SHA256
48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69
-
SHA512
49c9cc335608837e384a388c6185507d9ee863f24fbe59ae1fedd440f90500c01e6a923270ebbb75a6247b9f67538afc9b6ceec4f7c528701adbbf7ee27b81d0
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSx:+NWPkHlUfBgpuPdWzyuDTifgyWlo
Behavioral task
behavioral1
Sample
48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69N.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
ToaksBitch
letsgoboom.no-ip.info:1604
DC_MUTEX-ADL2HN0
-
gencode
vwp1Z9lmZ3Pj
-
install
false
-
offline_keylogger
true
-
password
runescaped
-
persistence
false
Targets
-
-
Target
48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69N.exe
-
Size
576KB
-
MD5
df697cf4cfada8ea190ec0b241f77180
-
SHA1
d0eaea95cf2e772f65d730bf2b8854fea0f69b0a
-
SHA256
48b5a13d27dcad0b2e7c9b211be3822309cc36e456f7a3cf59a459734d986e69
-
SHA512
49c9cc335608837e384a388c6185507d9ee863f24fbe59ae1fedd440f90500c01e6a923270ebbb75a6247b9f67538afc9b6ceec4f7c528701adbbf7ee27b81d0
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSx:+NWPkHlUfBgpuPdWzyuDTifgyWlo
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-