General

  • Target

    8651210702f65f8fcc37e84d6d0dcebdc1c94a4b401fe69410d685b283dddb35

  • Size

    251KB

  • MD5

    72de5a396a64f689d0d64c1169511d90

  • SHA1

    1e0e54146e0219884a703c5fbba8fe6bf3d5c2ca

  • SHA256

    8651210702f65f8fcc37e84d6d0dcebdc1c94a4b401fe69410d685b283dddb35

  • SHA512

    970f8a72d1fddb88021bc3c6524e8c3e219477c99a31d4bbd9a833693037b965f3f1b8a989ae8045b9c943afd5a87f08967651e59996c21a0e6a1e4d4dbbb732

  • SSDEEP

    6144:KcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37j:KcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

User2

C2

127.0.0.1:1604

Mutex

DC_MUTEX-K1RTGJJ

Attributes
  • gencode

    gLiL6Z29k2DT

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 8651210702f65f8fcc37e84d6d0dcebdc1c94a4b401fe69410d685b283dddb35
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections