General

  • Target

    b448acd002e1d234af55aa922d8c7e246012d1abbbb69a123936686ff41ba335

  • Size

    349KB

  • MD5

    62b72151e3f687745c74bf09f8a59090

  • SHA1

    b260f9ec5ef74213523c2326d10cf5ad2213216a

  • SHA256

    b448acd002e1d234af55aa922d8c7e246012d1abbbb69a123936686ff41ba335

  • SHA512

    b3a3a2347dce9e2e8c34784a30ec4dace8cb0ab1a638cd87b363cde0ad07d3ce91012d297e28d495a60d9639dbecf5f5a37472d80ca87848bada96d370e96bb0

  • SSDEEP

    6144:UcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37AVJvJKKhcKXbJ:UcW7KEZlPzCy376vJKebJ

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Luke

C2

luke123129876.no-ip.org:1337

Mutex

DC_MUTEX-94FDLRY

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    H3WfRT6hYmZ6

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b448acd002e1d234af55aa922d8c7e246012d1abbbb69a123936686ff41ba335
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections