General

  • Target

    0f0b1650c9f50ada21f103a256f1ea916fafacec0b6f37eb58e1b93275f80f67

  • Size

    252KB

  • MD5

    5cb41d5644b7fbcc80696ca93a7f8db0

  • SHA1

    50b84025fb13434eb6215dfd37ea4f0a2e605dcf

  • SHA256

    0f0b1650c9f50ada21f103a256f1ea916fafacec0b6f37eb58e1b93275f80f67

  • SHA512

    e067d8036c4695d11326d17c3e7592f04d4b48a03075883f19003455d0b4a461ac6d1db2c2cfe6cf5e26fedccda71e84022dccb247c7eca8b58cad0fce3988c2

  • SSDEEP

    6144:9cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:9cW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

davidbre.noip.me:1604

Mutex

DC_MUTEX-C2MMFJV

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    8hBR0eRJKy3N

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 0f0b1650c9f50ada21f103a256f1ea916fafacec0b6f37eb58e1b93275f80f67
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections