General

  • Target

    5fa981f0298a0ec0cbadb27383066b80513ae537fa3e182d6125a13503e0f973

  • Size

    266KB

  • MD5

    4f29075403bf5e2751f1350f6802fa28

  • SHA1

    66c564b2c2e21e4244fde8c483061e97cf705704

  • SHA256

    5fa981f0298a0ec0cbadb27383066b80513ae537fa3e182d6125a13503e0f973

  • SHA512

    d6e71d09cc90bd7427ee611c824f74333ab5589ef37df06b2c3de88cb3ebadb21ff86735968b21b0833c5fea0c8efc60df848eaf43b127b3ee8f23402bbb7534

  • SSDEEP

    6144:DcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37MbQ:DcW7KEZlPzCy37aQ

Malware Config

Extracted

Family

darkcomet

Botnet

EaSyServer

C2

eaasy.no-ip.org:1604

Mutex

DC_MUTEX-UA5N2KN

Attributes
  • gencode

    Uu7RYCo64fLJ

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 5fa981f0298a0ec0cbadb27383066b80513ae537fa3e182d6125a13503e0f973
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections