General

  • Target

    0edfdfc0c5e35db4ea163ad41db66ffc1bce6362f26f9144950cc0df7db9db8f

  • Size

    2.9MB

  • MD5

    fa42ccd6f594bffeddd05814c6b2aa1b

  • SHA1

    59c19db02b4e6bc28089b38a517c78e555f8ef3a

  • SHA256

    0edfdfc0c5e35db4ea163ad41db66ffc1bce6362f26f9144950cc0df7db9db8f

  • SHA512

    49f7ce75180996d409eb4864854340fe8cc8a1e4031f0e3082d7918a758e3dc21c289285b97f8db63c18f5a36928d98436281e583e1c277dd4f6bec2e8798edb

  • SSDEEP

    49152:tOIg1xe1ld9AoQ8yOdHMO2h8WOAEh9vLxDcItmPDT1x9A9FHipMMMSiYv:/gLeDd9AozyOdH8h8W5i9xVtmPDT1x9V

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

ggafa.hopto.org:1604

Mutex

DC_MUTEX-WD3Q1KE

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    buaMe2MjX7EH

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 0edfdfc0c5e35db4ea163ad41db66ffc1bce6362f26f9144950cc0df7db9db8f
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections