Behavioral task
behavioral1
Sample
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5
-
Size
658KB
-
MD5
f979bb14551c7b5166c2564f0cb81b17
-
SHA1
8ee1be6c76d7a2a1179564bd0e12bb94a603402c
-
SHA256
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5
-
SHA512
232f74ea88561f67e5a3095b83681e4f35e49e5c877e81c23cf9b04994a299e8fd981e2efae97297e6f4226ad7d7f49bd2ee4eb4d0d9a4162f22dd2749e8af23
Malware Config
Extracted
Family
darkcomet
Botnet
All
C2
192.168.0.102:1604
192.168.0.102:81
Mutex
DC_MUTEX-GRA2N0X
Attributes
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
jqHg0YaebT2u
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
Files
-
8644f9c0bdda59237eddd3272a41a41633abaeff3668ddcd71a54610456288b5.exe windows x86