General

  • Target

    b81891163ec45e09bb645024d8a8acc2b58cabc8157b5026944a846bfbd4c4b9

  • Size

    349KB

  • MD5

    4f96b73a2be8bf0d8d580864b4df8ca0

  • SHA1

    33ceef3e0bc7a45e79622f1dd658b30b62c4bc5c

  • SHA256

    b81891163ec45e09bb645024d8a8acc2b58cabc8157b5026944a846bfbd4c4b9

  • SHA512

    1bc68c7f24a08de4425651bf37b4b696a50d6dfcb706de20617418d74df7775aa6306eaa58551cde88b6ec0d772fc14ea319f892fb51b5f855bd99799588df14

  • SSDEEP

    6144:+cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37YlvccV:+cW7KEZlPzCy37SUcV

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-8N3SWRJ

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    mR5ArMtgJeAc

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Windows Update

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b81891163ec45e09bb645024d8a8acc2b58cabc8157b5026944a846bfbd4c4b9
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections