General

  • Target

    a7f9431e40cd946dc8aa2317bed9dc0de8a9591a79f36b19cec15798bf15e178

  • Size

    283KB

  • MD5

    907d56e939eb1b51f698f39fcde89f30

  • SHA1

    3b73e987d2fe53b0671a29eeeda9eb00239c2905

  • SHA256

    a7f9431e40cd946dc8aa2317bed9dc0de8a9591a79f36b19cec15798bf15e178

  • SHA512

    1bb760d29e265b302671a014f7e5d058d2e342e568e0d0f8362668236f23f0ce7911529ce3f286008e2d52a5f757b3d146517dcfd0992abaea2d373a10b711b8

  • SSDEEP

    6144:tcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37i:tcW7KEZlPzCy37i

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

darckkoment.hopto.org:1604

Mutex

DC_MUTEX-4HUWVP0

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    DCrLSVHaG4Ys

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a7f9431e40cd946dc8aa2317bed9dc0de8a9591a79f36b19cec15798bf15e178
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections