General

  • Target

    1185a0ec37d0edaba196a73f3b2f9df0126caca14011876c34f375ef3a974318

  • Size

    283KB

  • MD5

    9c40dc626ff68bd1b114b266ad83aaaa

  • SHA1

    4852aa302d72519f443bff5fa14ae44bec7183a2

  • SHA256

    1185a0ec37d0edaba196a73f3b2f9df0126caca14011876c34f375ef3a974318

  • SHA512

    c09773f312edf242b4071a9eb42e634db36587ebf53e5430ab95ff1421a327fe7b7f909be03279d65db58a335c3958960a96e29c342f926b90e0d70cf54f93cd

  • SSDEEP

    6144:5cNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PH:5cWkbgTYWnYnt/IDYhPH

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:888

Mutex

DC_MUTEX-7X1Q8Z3

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    6Rm4GrjxWWjW

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1185a0ec37d0edaba196a73f3b2f9df0126caca14011876c34f375ef3a974318
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections