General

  • Target

    19e5a79bd2bb228fb166be53607fac6a3b48f7730cc4b0dd01e5f0e2f8485d1c

  • Size

    253KB

  • MD5

    f4a3645aaaa7b14f4dec9a9f2db0040e

  • SHA1

    8430b2a225c8890a354024eb3273e5a21924aac2

  • SHA256

    19e5a79bd2bb228fb166be53607fac6a3b48f7730cc4b0dd01e5f0e2f8485d1c

  • SHA512

    c14c8aeb6147ad25f5089ff275762f21b066e781c7c2777a055adf11c15549e6dee729e577333d1221b6c61d3731c3824aeb0328650103c6edc77bf9a0cb18f1

  • SSDEEP

    6144:8D7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZwI4:8l8E4w5huat7UovONzbXw

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:888

Mutex

DC_MUTEX-3Y5WKVN

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ELdwUcYkBbef

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 19e5a79bd2bb228fb166be53607fac6a3b48f7730cc4b0dd01e5f0e2f8485d1c
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections