General
-
Target
Comet.exe.zip
-
Size
8.6MB
-
Sample
241226-mp9pxatjfz
-
MD5
f1bf2341c47307dd74e84f352ac1d514
-
SHA1
84b1f90ec0f8714e38d2fa39c3f9a21732aed85b
-
SHA256
414180a9f9707cb3501546487051badead26b0d08d0143302c62f84b81a565f5
-
SHA512
a825620164ead5d841865833ba912b39459caf25976bb772093ed4e9430b8fe9493771ed3e60c7e75ebefb04f22e693fb815fec266426ab751698cf06d10b182
-
SSDEEP
196608:kyf7WXRRqIUXkiLamrFcDAMVd+elWPddJn42KHwcGFGA0Pv6D9ml:hSXLqJZ12D1jnlgdCvQcRAIck
Static task
static1
Behavioral task
behavioral1
Sample
Comet.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Comet.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1320235014511792160/59qb1BvUIDJlYJZoQnnxe4CNf8Swi8--Nwm7q4BECFectFCCJWiM-H8Ng2tA4-dl6Vyb
Targets
-
-
Target
Comet.exe.bin
-
Size
8.6MB
-
MD5
1f5d19397b48172aba35885f39e318fa
-
SHA1
df77020bffc62f386b5ce0ad0cde3d8f8b704b93
-
SHA256
dd780875686be33910002f91aaeb8f8ec70a2f3972c41c707a59ef18cd900e74
-
SHA512
4ccec7c602582d467a63e8f6e8fc222e73bb88a589256fac0577452b6ffaaec58adf2b5e216f8a27404c4717a74f239ce73226385133764b75baa775b25de4a0
-
SSDEEP
196608:u9+8ZspGS5puzUZqVBU6NABaScfR3xeUDyzfS/FNgeLCtNP:u9+EEp5ZqPBOhcftAUDyzqNutNP
Score10/10-
Skuld family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-