General

  • Target

    b21ac76abc67bfdda50c9b93f9c8bf876d14298edd879c66d50960d5957a521a

  • Size

    402KB

  • MD5

    a018400102cad9b5628ceda688e20c40

  • SHA1

    cbc3d0f75f200330783036288c3ce90e13b0cfa1

  • SHA256

    b21ac76abc67bfdda50c9b93f9c8bf876d14298edd879c66d50960d5957a521a

  • SHA512

    6efb63cd234d364d1fcbdaa5d5d518c09c000ece6b896e654f4a4c1e1241655dcb12f21e5108099962a7a704cdec41d306b3546900e4e3b5a9e498555b397b6d

  • SSDEEP

    6144:DBJVqu5jxRl+t6Ge0qw0kw9+Ks9a8/7z6lnRy8HuDlD3nbBalsYECdc70JwdK+Jh:DtqwjxRl+t6GfL7zcRyauJbcsAc7Yw

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Vitma

C2

driofraps.no-ip.org:2222

Mutex

DC_MUTEX-54TC9J0

Attributes
  • InstallPath

    MSDCSC\chrome.exe

  • gencode

    a9QNqgBQ04mL

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b21ac76abc67bfdda50c9b93f9c8bf876d14298edd879c66d50960d5957a521a
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections