General

  • Target

    fec5c46e06757f6e85f6a9a27bea1d40fda2e85f873de4807c879b882520b7ec

  • Size

    349KB

  • MD5

    4a6ad8215d24bad1a75554052c28a833

  • SHA1

    408a710b24b1efe8aa80aa587ad10e3b68a3da17

  • SHA256

    fec5c46e06757f6e85f6a9a27bea1d40fda2e85f873de4807c879b882520b7ec

  • SHA512

    78020a225b3658db91aba84a5bda8644e9c81e6ed10e0e3bdb8fa016f517b9b3ab8b5e17744a39efc0a8f256a8ad2bdd447c1af04e09592c7f979872fc4cfcdd

  • SSDEEP

    6144:EcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37K:EcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

ninjagymnast123654.no-ip.biz:1606

Mutex

DC_MUTEX-JMXXKVQ

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    0YoKQrEbvtvi

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • fec5c46e06757f6e85f6a9a27bea1d40fda2e85f873de4807c879b882520b7ec
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections