General

  • Target

    92760963e6eb5e27406510ce615900b7dd6d2ff618cd88f799bf0cb9ac387bb3

  • Size

    254KB

  • MD5

    175f2d9aebc4ac568a483a86af5e2188

  • SHA1

    1883c73576b01e32c59643f00730906058795175

  • SHA256

    92760963e6eb5e27406510ce615900b7dd6d2ff618cd88f799bf0cb9ac387bb3

  • SHA512

    c1801bccb90550511c23524f01278232bed5e03a6e65b01c5d90d683830083d155a035efe1e5c6b64268f594d64b0d0a064a4eb2e5ec1b0fa9f53f517395ee15

  • SSDEEP

    6144:pcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:pcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

People

C2

radeiaor111.hopto.org:1604

Mutex

DC_MUTEX-MYYG5AQ

Attributes
  • InstallPath

    app\update.exe

  • gencode

    JRjs4z5EKcwD

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 92760963e6eb5e27406510ce615900b7dd6d2ff618cd88f799bf0cb9ac387bb3
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections