General

  • Target

    f39577e2b9f1f072160f1a7a568949e0399952e8f674bdf4a32b3f1d2ab6500d

  • Size

    351KB

  • MD5

    68570f555fc1595e6ce6b2d8f34c059c

  • SHA1

    28e3ba38749acf761fcb0e2c46c6ea6d2e7fe726

  • SHA256

    f39577e2b9f1f072160f1a7a568949e0399952e8f674bdf4a32b3f1d2ab6500d

  • SHA512

    ad27cbb422c5f8c4401a725509a97de4fd75239fb2717fa4f8250e77af2125e12f518e178b3c0d4eea3616e6ba3a108fdd6ac4172f17303fb8f7df170a4f4340

  • SSDEEP

    6144:8D7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZ69I2hgplSZ1:8l8E4w5huat7UovONzbXwOlh/NVR

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

79.203.54.214:1604

Mutex

DC_MUTEX-15E21A0

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Zw1LapYfDnkx

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f39577e2b9f1f072160f1a7a568949e0399952e8f674bdf4a32b3f1d2ab6500d
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections