General

  • Target

    8ce660126f62daa38399afae4f53c3a69dbad816b6030daae4f43566964595ad

  • Size

    253KB

  • MD5

    a1af7a30f3b145b0638608e49b2bb927

  • SHA1

    c3ff6ff1b941e39754737e5213f48a14424387f6

  • SHA256

    8ce660126f62daa38399afae4f53c3a69dbad816b6030daae4f43566964595ad

  • SHA512

    8a62140b69e39c27b91468a324b12b342c4f65bcb405071c024e8ca5c26ddde43093a198365a85001350eec48a7823341da82ab3fa9cf7ab5ebeb58245354e4c

  • SSDEEP

    6144:OD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZM:Ol8E4w5huat7UovONzbXw

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

zl5.hopto.org:1604

zl5.hopto.org:27015

Mutex

DC_MUTEX-0Q5LT4L

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    uVsihbkxVDZL

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 8ce660126f62daa38399afae4f53c3a69dbad816b6030daae4f43566964595ad
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections