General

  • Target

    caf49fcb6989508bff384a1ff2aa1f0f8a902e1d3a19aa62866e8e5daf468d74

  • Size

    251KB

  • MD5

    91e451f71e4431f85ab0413996cacac0

  • SHA1

    a09017bc869387b083030b9b1b0a79e56485589d

  • SHA256

    caf49fcb6989508bff384a1ff2aa1f0f8a902e1d3a19aa62866e8e5daf468d74

  • SHA512

    50da85ff716c7d4aa79b1fc00ebe2728221dece1f7e29bc8d0f626ab557b04dca49ff03083a45294705c6ef8c350150a58176c750bb86bfb4e49456b9eaed8a1

  • SSDEEP

    6144:jcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37X:jcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Cfg

C2

176.41.167.20:1604

195.214.179.203:1604

176.232.110.78:1604

Mutex

DC_MUTEX-50JRDD7

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    mm2rHTqdm09n

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Micro Update

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • caf49fcb6989508bff384a1ff2aa1f0f8a902e1d3a19aa62866e8e5daf468d74
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections