General

  • Target

    be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6

  • Size

    744KB

  • MD5

    a019db3bbafc6c2b3e1e42b1f8dc21ae

  • SHA1

    1a6a386444a67f48b25320831ccdb7437181c65f

  • SHA256

    be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6

  • SHA512

    c49422d469a0fc8c8689ac8193c64cdaf7e68bae1fef65ed30feb29fbc6d03484c1789e6f836cc016d4eb50f6e4ac595a80497ee74d2f6b0d44ce72b8fce2ca5

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

boreasfgasd.ddns.net:1604

Mutex

DC_MUTEX-C2M4WWM

Attributes
  • gencode

    boVCPNsNcng5

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6
    .exe windows x86