General

  • Target

    741669c77f2fb2ae4ce6ae5b7cd9291f9cc8b3fc8e08315ad2d3a4f3aed39375

  • Size

    252KB

  • MD5

    65aa1ec968d2ca300c9901359aad1040

  • SHA1

    b28db3d5957cd4cd7c543bf2367def3341e832fc

  • SHA256

    741669c77f2fb2ae4ce6ae5b7cd9291f9cc8b3fc8e08315ad2d3a4f3aed39375

  • SHA512

    68bf63a2bb8a6b78669308f9bf7316e8ad4f38514e6f1c12619f113d14c20ffa997b9fa3eaf4a618999b3f55235388c954cbf07ab556473480261601a3a725fb

  • SSDEEP

    6144:hcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PHQm:hcWkbgTYWnYnt/IDYhPh

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

ghackihg.ddns.net:1604

Mutex

DC_MUTEX-GLW7E8M

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    XFSiqDFCatt5

  • install

    true

  • offline_keylogger

    true

  • password

    11a99l77e88xXx

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 741669c77f2fb2ae4ce6ae5b7cd9291f9cc8b3fc8e08315ad2d3a4f3aed39375
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections