General

  • Target

    Comet_Boostrapper.exe

  • Size

    6.0MB

  • Sample

    241021-rjqgasydql

  • MD5

    b43449b2ead5542089918974af96b96d

  • SHA1

    26316624ca3d8177d30be416bfd4ab3b0dbaf883

  • SHA256

    90217c3a2e80a0b003feecbd86751ec353cc99765babddb7137342a67d8b3ca7

  • SHA512

    d393a639584514e64a106b66ee2b5844188ef5c5a8d0d7958d9aa739bcd541cf697f795171967efaccb417590dbd25a9ad0b46fed23ad8e1f324183f4e5c84b3

  • SSDEEP

    98304:OnEtdFByLvrnamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RNOnAK0HdmRy+:OWFELjKeN/FJMIDJf0gsAGK4RInAK04j

Malware Config

Targets

    • Target

      Comet_Boostrapper.exe

    • Size

      6.0MB

    • MD5

      b43449b2ead5542089918974af96b96d

    • SHA1

      26316624ca3d8177d30be416bfd4ab3b0dbaf883

    • SHA256

      90217c3a2e80a0b003feecbd86751ec353cc99765babddb7137342a67d8b3ca7

    • SHA512

      d393a639584514e64a106b66ee2b5844188ef5c5a8d0d7958d9aa739bcd541cf697f795171967efaccb417590dbd25a9ad0b46fed23ad8e1f324183f4e5c84b3

    • SSDEEP

      98304:OnEtdFByLvrnamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RNOnAK0HdmRy+:OWFELjKeN/FJMIDJf0gsAGK4RInAK04j

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks