Overview
overview
10Static
static
10XPloit.zip
windows7-x64
3XPloit.zip
windows10-2004-x64
1ForlornApi.dll
windows7-x64
1ForlornApi.dll
windows10-2004-x64
1ForlornInject.dll
windows7-x64
1ForlornInject.dll
windows10-2004-x64
7XPloit.deps.json
windows7-x64
3XPloit.deps.json
windows10-2004-x64
3XPloit.exe
windows7-x64
10XPloit.exe
windows10-2004-x64
10XPloit.exe
windows7-x64
10XPloit.exe
windows10-2004-x64
10main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3XPloit.pdb
windows7-x64
3XPloit.pdb
windows10-2004-x64
3XPloit.run...g.json
windows7-x64
3XPloit.run...g.json
windows10-2004-x64
3workspace/IY_FE.iy
windows7-x64
3workspace/IY_FE.iy
windows10-2004-x64
3workspace/...s.json
windows7-x64
3workspace/...s.json
windows10-2004-x64
3General
-
Target
XPloit.zip
-
Size
23.9MB
-
Sample
241221-v9y3xavlaz
-
MD5
df5931935ffe284ca5b40791607e7a4c
-
SHA1
262399853d05ece01f740d1e820aa892b065b1bd
-
SHA256
3d6bc3c0247c2b4f87282da002475ac068b5b6cac948743f697832a9a4a4c6de
-
SHA512
38ac5f801f73714c840e16c8513b3c4f2d29815f042585a61c06830a76c1cae0e7e295241be686ae2d5f4bd19503ee9e69dadd611b1389d6ea9018553df785f7
-
SSDEEP
393216:OH+kig1whmEJ+oUAgHRsP56jvR3vJ0RPaati4b8sVNSCoOYhkhalpMJpQl+25+:sB1w/J+oUANMj53vOxavKxoqhMgpw+
Behavioral task
behavioral1
Sample
XPloit.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XPloit.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ForlornApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ForlornApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ForlornInject.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
ForlornInject.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
XPloit.deps.json
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
XPloit.deps.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
XPloit.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
XPloit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
XPloit.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
XPloit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
main.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
XPloit.pdb
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
XPloit.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
XPloit.runtimeconfig.json
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
XPloit.runtimeconfig.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
workspace/IY_FE.iy
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
workspace/IY_FE.iy
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
workspace/MercurySettings.json
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
workspace/MercurySettings.json
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
Sazan
127.0.0.1:1604
DC_MUTEX-R2MY49E
-
gencode
0JGDeNqTa1iX
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
XPloit.zip
-
Size
23.9MB
-
MD5
df5931935ffe284ca5b40791607e7a4c
-
SHA1
262399853d05ece01f740d1e820aa892b065b1bd
-
SHA256
3d6bc3c0247c2b4f87282da002475ac068b5b6cac948743f697832a9a4a4c6de
-
SHA512
38ac5f801f73714c840e16c8513b3c4f2d29815f042585a61c06830a76c1cae0e7e295241be686ae2d5f4bd19503ee9e69dadd611b1389d6ea9018553df785f7
-
SSDEEP
393216:OH+kig1whmEJ+oUAgHRsP56jvR3vJ0RPaati4b8sVNSCoOYhkhalpMJpQl+25+:sB1w/J+oUANMj53vOxavKxoqhMgpw+
Score3/10 -
-
-
Target
ForlornApi.dll
-
Size
13KB
-
MD5
e31fc5f539332de2888121b098d0d5d2
-
SHA1
2c76b76bc2a4bd3ce49394a15687dfd6835aa46d
-
SHA256
0bef874d8dab4fcf8024227ccc870ed7f6fb9c6d5db0ffe5d447948c26c3cad8
-
SHA512
70db518de1567fd297fe8d4a9a3bf68ab7d7b3c2cdb9358dc84ec2213313aa3d4bb831453044662fdc82d87cc9f34344109bbd4ba91c500ef797f99e7bc55564
-
SSDEEP
192:EZRcjJAwd3EUkgrUlGaHIofKbCkWNgF3anfm+eN6J+2uan1WVqG0siS1ag9:+EGuQpHAgN3aNqlWVjyrg9
Score1/10 -
-
-
Target
ForlornInject.dll
-
Size
6.3MB
-
MD5
a40dcf9942879728c738a5161e9ea455
-
SHA1
3d35c866c70db1c34daba07197bc4a834bc794f3
-
SHA256
8e11bbf4a2f5ea522804219789db209f906ec7e23d5b273547e4eceee82b6c44
-
SHA512
ab41eddeee2c7edb9dda5d91843546f2d0e41e11ac125cd9750b9531a63c7f4abd2faee412d8fd309390d1040e5b787ea98dfd754b14830aecedc739e0a9fbde
-
SSDEEP
196608:VqHqqhOnCaiiyFUHH76pyS1Ii8eGAvKQ0pOwqz:VqH8iiyFUSydi8eePpOw+
Score7/10 -
-
-
Target
XPloit.deps.json
-
Size
797B
-
MD5
47662f430e3091c399c3e2da1f529ba5
-
SHA1
a775b3330402cfd7054c9c681a8139fecf3b1120
-
SHA256
95744071bffef8925b87f20f67843dc60f0d4d36a560d8ecbb1ca16e7023813a
-
SHA512
1735d4f7dd41cdeb1fe7a4f7018bcec427e1fbea7ed06692664519e3f8a3b99440e3c72c4f2e05efbd7c59046f948bad637d8590fcb6cd78dea874a918337939
Score3/10 -
-
-
Target
XPloit.dll
-
Size
74KB
-
MD5
5331a85d98acdf41a0aab7c46f00ae04
-
SHA1
24c858bb95a6b0dbc0fce9fac98e9f9698bc7bd9
-
SHA256
825ebf8702679cb5e0899308499b5efb7bdafc9c60e822c9599b50b7afb8cd28
-
SHA512
161e341a18178f2c68a64d8e808f80e57b957c4d9741c24e1bd06eb37a3739ece2d1d46e32645be707cce4c70b660564c6bd606762aca8701bf2411d5bb654e2
-
SSDEEP
768:EBqw+t+VBh0QLFEJESSSF5M4faQmzQ4QZwuz+3jsnRVRE:8P4cBlKJj5tvmzaal4E
-
Darkcomet family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
XPloit.exe
-
Size
18.6MB
-
MD5
bb2ef742beac994d93804ffd0f5e25a9
-
SHA1
ca276708b744d244b4e1dc897eb707869e681c34
-
SHA256
54a08d439e0024aaa094b8bc9360672c6d7c09d800548a72efdc3ac6a11fe151
-
SHA512
fc79e068d5953ef62d60d8741896661be482b89816e9a7430151f6040ebfd3a48df649c596903017781bfa3febc8d2460ad53f83348db740341f54a093f27122
-
SSDEEP
393216:ZbqPnLFXlrWQ8DOETgsvfG7gsNvEvpc2R20Imm3:sPLFXNWQhEiFiv2G2T3
-
Darkcomet family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
df80862d09cb2aef641db58fb9cf44af
-
SHA1
38e5d07ae5755c67dff69bb60a69385261810cad
-
SHA256
df6fdb82eca45baa6a91b89cc9aa2fe59020a28e08df90b1d060932140a658f6
-
SHA512
ba31801f383cca23866513f36345358f91906c31b4a711e8e36d345ba7650f112119f0f175105b7e422c6be31ce62b047f974d39863e3d753fe2563653ffe05f
-
SSDEEP
192:wKKt0a3nD84gkuWdXwvHCZGr6JhwZNMdwtnw:bKB6PWuviZ++2ZNPtw
Score3/10 -
-
-
Target
XPloit.pdb
-
Size
13KB
-
MD5
922f91a14a0b8902176fa1ecf563e944
-
SHA1
9dae211479a31dcb43857b70d5c354d603218d3a
-
SHA256
91f938f338dc5480abca2c050213f4420ce329d26ecbe8c67aab95bcb5ae3ee8
-
SHA512
cdbbf08e03935115d2fbde86e9861f065faceab2ab903b1b05e6249adba4f66452f02d7df1cec22e9ea385a09cb4b4ad44233d7c07fabcf597c12da218e13862
-
SSDEEP
384:5MJ7Wf/v0cQgr4GZasF1esCUksOvtE6Bzc7Rr0fzqZQtjkcKopvHffxLApTHD3Ii:SWHxvohFEeqO7tjle3X
Score3/10 -
-
-
Target
XPloit.runtimeconfig.json
-
Size
443B
-
MD5
9db099f143ead47e224653d0dde19fe9
-
SHA1
d050db767fc64aa1705353132da3e35048475d3c
-
SHA256
7e79af92820e50910b90f1cade2728f45987393f24b50e384dc225d9773b7194
-
SHA512
579c3c870903b3d47dbc2567153fa7c73e0aa47387c6969b8982037884033a4b25de702e0efb8c7ae717b6b463192b917b18a79b1ef5f8c969f257422af2b65f
Score3/10 -
-
-
Target
workspace/IY_FE.iy
-
Size
1KB
-
MD5
5430cd099b8699e8bf8692b1ee282372
-
SHA1
e44b62849519db8a77b5ce6f8e5572e1edf2d041
-
SHA256
738277b369c0cfdec8ad0eb24aace538f19785ea134541657661ac80802730d7
-
SHA512
9126e43feaad90e61b7dc7eeff30616701bf8f85f4de669bed7acd10a0b01c97dd35276d0de42ad41041d30441c9ea9cd130450a5db1ead4c0aa06a4494f605c
Score3/10 -
-
-
Target
workspace/MercurySettings.json
-
Size
16B
-
MD5
be12004ab076e82cb7b308cf1322bbf7
-
SHA1
0de6f88fe43b9698ade3f6063c1b5a815c43b7f3
-
SHA256
ee09e40269075114a05082e03c87e115939ebc488d9ecced1a5fb74106a76ed7
-
SHA512
f66f8782cfed28687e860ec2f3806795654f82f50604a86f7b20657f04efe5eb5746aa7451042017d53f2fd03d9233d3f43526c2f90ac5c830e1ad3e82a27d49
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1