General

  • Target

    8614b2ded956894eb65f1fb498624d8cfe9f5ee05599981ef6f16dc7c7ee89bf

  • Size

    251KB

  • MD5

    dfa5a24fcaf54c7a0281e86994eba56b

  • SHA1

    bb3a4e20e147f646c560b95c645f0ac813ab8ef7

  • SHA256

    8614b2ded956894eb65f1fb498624d8cfe9f5ee05599981ef6f16dc7c7ee89bf

  • SHA512

    efc1e5843f4145563599cf94a983013d986b7bf1f5acb188ab8e9a67e18129c447ad510fe03294ad10924690c79196bbc912acc158e898337880336d36fa1ea6

  • SSDEEP

    6144:8cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:8cW7KEZlPzCy37

Malware Config

Extracted

Family

darkcomet

Botnet

×åëîâåê

C2

192.168.0.104:1604

fortdark.ddns.net:1604

Mutex

DC_MUTEX-9AJGZC0

Attributes
  • InstallPath

    MSDCSC\Java

  • gencode

    QzruVUr8hxHE

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    svhost

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 8614b2ded956894eb65f1fb498624d8cfe9f5ee05599981ef6f16dc7c7ee89bf
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections