General
-
Target
Comet_Boostrapper.exe
-
Size
6.0MB
-
Sample
241021-rjqgasydql
-
MD5
b43449b2ead5542089918974af96b96d
-
SHA1
26316624ca3d8177d30be416bfd4ab3b0dbaf883
-
SHA256
90217c3a2e80a0b003feecbd86751ec353cc99765babddb7137342a67d8b3ca7
-
SHA512
d393a639584514e64a106b66ee2b5844188ef5c5a8d0d7958d9aa739bcd541cf697f795171967efaccb417590dbd25a9ad0b46fed23ad8e1f324183f4e5c84b3
-
SSDEEP
98304:OnEtdFByLvrnamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RNOnAK0HdmRy+:OWFELjKeN/FJMIDJf0gsAGK4RInAK04j
Behavioral task
behavioral1
Sample
Comet_Boostrapper.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
Comet_Boostrapper.exe
-
Size
6.0MB
-
MD5
b43449b2ead5542089918974af96b96d
-
SHA1
26316624ca3d8177d30be416bfd4ab3b0dbaf883
-
SHA256
90217c3a2e80a0b003feecbd86751ec353cc99765babddb7137342a67d8b3ca7
-
SHA512
d393a639584514e64a106b66ee2b5844188ef5c5a8d0d7958d9aa739bcd541cf697f795171967efaccb417590dbd25a9ad0b46fed23ad8e1f324183f4e5c84b3
-
SSDEEP
98304:OnEtdFByLvrnamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RNOnAK0HdmRy+:OWFELjKeN/FJMIDJf0gsAGK4RInAK04j
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-