General

  • Target

    d17acc1ff5187ca6db71ee4ba1dd991a67c7f6f965927363532f8e286ceeee4a

  • Size

    251KB

  • MD5

    709476a5b2f1a1fe71b655ffa8b8d61e

  • SHA1

    48145291e671d4af94115c8606978f2107b92774

  • SHA256

    d17acc1ff5187ca6db71ee4ba1dd991a67c7f6f965927363532f8e286ceeee4a

  • SHA512

    b7c3f7635209d5bf0c45cf32c840521947efd4c5f52dd075e1fe044e922d6295cfd5752d0c2b8ad4dd7689c46b1aae1d82ac8efbee8ec4cd817511d58ebe8b6f

  • SSDEEP

    6144:GcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37M:GcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

darkcomet11753.zapto.org:1604

Mutex

DC_MUTEX-FF6D5Q1

Attributes
  • gencode

    7tVmap2fhAl5

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d17acc1ff5187ca6db71ee4ba1dd991a67c7f6f965927363532f8e286ceeee4a
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections