General

  • Target

    6aa1714aa9ab2d0cefb5f8ee9dfa78850fd3dbe32ac9d7b8db0ab0cfaf687a90

  • Size

    283KB

  • MD5

    ebf9b9aa46566390172fc9929cd2fc14

  • SHA1

    0673fbd0e76b828cae642eee449a7cb3745ca250

  • SHA256

    6aa1714aa9ab2d0cefb5f8ee9dfa78850fd3dbe32ac9d7b8db0ab0cfaf687a90

  • SHA512

    5c5d6d7b1b4044a8fac3ce1a7b11b066743b4f681050f6965cbb0cb58b9fff183538b172a82f6c7daa1b7ac4f98059b564d4461f5a173544af17cab3fb182fa5

  • SSDEEP

    6144:mcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0Pqr:mcWkbgTYWnYnt/IDYhPa

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

sms4kaka.hopto.org:5555

Mutex

DC_MUTEX-592DL0X

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    MuNYS9T6SHPe

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 6aa1714aa9ab2d0cefb5f8ee9dfa78850fd3dbe32ac9d7b8db0ab0cfaf687a90
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections