General

  • Target

    3a15d270fcf039d3fefdd7c5903715a8ad463ceb13991fb7c5c434af031a747f

  • Size

    756KB

  • MD5

    434d1b300f61771f601fc7c1a41945e1

  • SHA1

    9297963c948c2e131887e7c5816fc4c1f8a18d7e

  • SHA256

    3a15d270fcf039d3fefdd7c5903715a8ad463ceb13991fb7c5c434af031a747f

  • SHA512

    9dfc6c4c4c6fe6e9e859d28b25b94fc10328e87b15c31ab5ae20b95f1e971f5e3529b74ad8d6266bd37871134e338d67dbeb394a51564955cb043e4b434b31ff

  • SSDEEP

    12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h4:KZ1xuVVjfFoynPaVBUR8f+kN10EBu

Malware Config

Extracted

Family

darkcomet

Botnet

Change Name Steam

C2

hacktest.ddns.net:1604

Mutex

DC_MUTEX-GSEW7W2

Attributes
  • gencode

    Q4VtWvjWjvzD

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

Files

  • 3a15d270fcf039d3fefdd7c5903715a8ad463ceb13991fb7c5c434af031a747f
    .exe windows x86

    e5b4359a3773764a372173074ae9b6bd


    Headers

    Imports

    Sections