General

  • Target

    38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b

  • Size

    283KB

  • MD5

    a621055f753ae69983b149c494e24929

  • SHA1

    c84337eb41ff9f6f9c2a999292db7e3066a379e3

  • SHA256

    38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b

  • SHA512

    5d1be5fb16549c3b120c6c7a20e3086c764ee9bdf4faad0d22875057193bcb1aded84147b32e00e8df95fcf3e2c0e8e2948a1bfaaef0aef4408f38172d400de8

  • SSDEEP

    6144:ncNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0Pi+:ncWkbgTYWnYnt/IDYhPi+

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

IP: 95.153.133.216:1604

Mutex

DC_MUTEX-0P8M51K

Attributes
  • gencode

    TGWq7XBoqMps

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections