General

  • Target

    160c2deac4a97c721457d00bb3b9e16a3711d1703a69190a7adf56c92332be2e

  • Size

    257KB

  • MD5

    6603484df74a9c938e021dbc92e4b680

  • SHA1

    67fb98795faa0e6a26c04ce42d1d462cb7927c86

  • SHA256

    160c2deac4a97c721457d00bb3b9e16a3711d1703a69190a7adf56c92332be2e

  • SHA512

    b82a951d9f4595d583aa170634535f93f7d6f47530ead6fb5292543133836d6f3a37f0b557a4c22a6b7c1bebf95dc3785d6f5ec3bce27c3c66077c99f7260dfa

  • SSDEEP

    6144:9cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37t:9cW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

germanhackerz.no-ip.biz:8080

Mutex

DC_MUTEX-BW14XCS

Attributes
  • InstallPath

    troan2\trojan2.exe

  • gencode

    rUYdgDYyAGL4

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 160c2deac4a97c721457d00bb3b9e16a3711d1703a69190a7adf56c92332be2e
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections