General

  • Target

    b4c1c4905b766e0a744b6c6084a07bdfd6830c267505bc16354deb2ba89e2da9

  • Size

    251KB

  • MD5

    a00dfa4b09eed88ed647d6847f341ff0

  • SHA1

    a35f48b767d0c0ce1114b36a0be3c64c2c987728

  • SHA256

    b4c1c4905b766e0a744b6c6084a07bdfd6830c267505bc16354deb2ba89e2da9

  • SHA512

    c2e1ae5ece170bd08a76d07a379d999d831015d36771e172327cca781b1cef7c8e1e7d44cf3ec0bb5cae6fea914cfbdf8471ee3c5a26720388709597aecb0f74

  • SSDEEP

    6144:WcNYS996KFifeVjBpeExgVTFSXFoMc5o3AYEok:WcW7KEZlPow

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

SaFa7

C2

127.0.0.1:14312

Mutex

DC_MUTEX-YJJJGML

Attributes
  • gencode

    Pf6aQEENDAeA

  • install

    false

  • offline_keylogger

    true

  • password

    11

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b4c1c4905b766e0a744b6c6084a07bdfd6830c267505bc16354deb2ba89e2da9
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections