General
-
Target
XPloit.zip
-
Size
23.9MB
-
Sample
241220-3bbtqawpat
-
MD5
df5931935ffe284ca5b40791607e7a4c
-
SHA1
262399853d05ece01f740d1e820aa892b065b1bd
-
SHA256
3d6bc3c0247c2b4f87282da002475ac068b5b6cac948743f697832a9a4a4c6de
-
SHA512
38ac5f801f73714c840e16c8513b3c4f2d29815f042585a61c06830a76c1cae0e7e295241be686ae2d5f4bd19503ee9e69dadd611b1389d6ea9018553df785f7
-
SSDEEP
393216:OH+kig1whmEJ+oUAgHRsP56jvR3vJ0RPaati4b8sVNSCoOYhkhalpMJpQl+25+:sB1w/J+oUANMj53vOxavKxoqhMgpw+
Behavioral task
behavioral1
Sample
XPloit.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XPloit.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
Sazan
127.0.0.1:1604
DC_MUTEX-R2MY49E
-
gencode
0JGDeNqTa1iX
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
XPloit.zip
-
Size
23.9MB
-
MD5
df5931935ffe284ca5b40791607e7a4c
-
SHA1
262399853d05ece01f740d1e820aa892b065b1bd
-
SHA256
3d6bc3c0247c2b4f87282da002475ac068b5b6cac948743f697832a9a4a4c6de
-
SHA512
38ac5f801f73714c840e16c8513b3c4f2d29815f042585a61c06830a76c1cae0e7e295241be686ae2d5f4bd19503ee9e69dadd611b1389d6ea9018553df785f7
-
SSDEEP
393216:OH+kig1whmEJ+oUAgHRsP56jvR3vJ0RPaati4b8sVNSCoOYhkhalpMJpQl+25+:sB1w/J+oUANMj53vOxavKxoqhMgpw+
-
Darkcomet family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1