General

  • Target

    2b4a79e25992395c0aefec0702088ec365f731dfeaf42a61fb910e2012f396d0

  • Size

    253KB

  • MD5

    8042e161f29f7611e479358616ebce90

  • SHA1

    9e66839a0b7175ed89cc3f415979aa20f13caf71

  • SHA256

    2b4a79e25992395c0aefec0702088ec365f731dfeaf42a61fb910e2012f396d0

  • SHA512

    0d473b8ef9e8e3ab14aca1bd7ac18cd61be22ee8d6ef59feceff8028a34319afd80c20b8efcd965692e4b12353c62d685680bb2af20b5de9fe45cbce3e6b5e2d

  • SSDEEP

    6144:mD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZ:ml8E4w5huat7UovONzbXw

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

rochustoad.ddns.net:1604

rochustoad.ddns.net:27015

176.100.120.27:27015

176.100.120.27:1604

Mutex

DC_MUTEX-3G9F3VY

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Am7F7zgdwCsR

  • install

    true

  • offline_keylogger

    false

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2b4a79e25992395c0aefec0702088ec365f731dfeaf42a61fb910e2012f396d0
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections