Resubmissions

21-12-2024 17:42

241221-v9y3xavlaz 10

20-12-2024 23:19

241220-3bbtqawpat 10

20-12-2024 19:29

241220-x7fjwssqdm 10

General

  • Target

    XPloit.zip

  • Size

    23.9MB

  • MD5

    df5931935ffe284ca5b40791607e7a4c

  • SHA1

    262399853d05ece01f740d1e820aa892b065b1bd

  • SHA256

    3d6bc3c0247c2b4f87282da002475ac068b5b6cac948743f697832a9a4a4c6de

  • SHA512

    38ac5f801f73714c840e16c8513b3c4f2d29815f042585a61c06830a76c1cae0e7e295241be686ae2d5f4bd19503ee9e69dadd611b1389d6ea9018553df785f7

  • SSDEEP

    393216:OH+kig1whmEJ+oUAgHRsP56jvR3vJ0RPaati4b8sVNSCoOYhkhalpMJpQl+25+:sB1w/J+oUANMj53vOxavKxoqhMgpw+

Malware Config

Extracted

Family

darkcomet

Botnet

Sazan

C2

127.0.0.1:1604

Mutex

DC_MUTEX-R2MY49E

Attributes
  • gencode

    0JGDeNqTa1iX

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • Detects Empyrean stealer 1 IoCs
  • Empyrean family
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • XPloit.zip
    .zip
  • ForlornApi.dll
    .dll windows:4 windows x64 arch:x64


    Headers

    Sections

  • ForlornInject.dll
    .dll windows:6 windows x64 arch:x64

    22f1907af71b391673dc37c47e7cfa75


    Headers

    Imports

    Exports

    Sections

  • XPloit.deps.json
  • XPloit.dll
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • XPloit.exe
    .exe windows:4 windows x86 arch:x86

    e5b4359a3773764a372173074ae9b6bd


    Headers

    Imports

    Sections

  • main.pyc
  • XPloit.pdb
  • XPloit.runtimeconfig.json
  • workspace/IY_FE.iy
  • workspace/MercurySettings.json