General
Target
Filesize
Completed
Task
a0f7c2f2ac9cd595abc825bbed28df20ffdbbf7664269cf3c49c106a267dba62
252KB
21-05-2022 18:33
static1
Score
10/10
MD5
SHA1
SHA256
SHA256
532a6afb45c841f08a0ff9f104559334
2fe9463e271b50907d72174992f4adf5c5c5eace
a0f7c2f2ac9cd595abc825bbed28df20ffdbbf7664269cf3c49c106a267dba62
313db495bc51449b94484e749a2bee932686fabdfcf2e1a6e2c8caa10fe034960408c2f6a9b90f31e3ae55a1881752fab4baf1bae1fc5d14cf073884c358e7a4
Malware Config
Extracted
Family | darkcomet |
Botnet | stepa_po4ta |
C2 |
triplekill.ddns.net:1604 |
Attributes |
InstallPath MSDCSC\proverka_stiller.exe
gencode qsGLcJtz3RXp
install true
offline_keylogger true
persistence false
reg_key Java |
Signatures 2
Filter: none
-
Darkcomet family
Tags
-
UPX packed file
Description
Detects executables packed with UPX/modified UPX open source packer.
Tags
Reported IOCs
resource yara_rule sample upx
Files
-
a0f7c2f2ac9cd595abc825bbed28df20ffdbbf7664269cf3c49c106a267dba62
-
out.upx