General

  • Target

    d5e91ceb5f7dd8921acb88f40b2f2fb59f9bbbddacc26f5f35e6e089d482412b

  • Size

    349KB

  • MD5

    84a30bc75692e90c8d3e7c3c9f20cf40

  • SHA1

    e67cb733069a66917b49d2e75e743d7e720139ac

  • SHA256

    d5e91ceb5f7dd8921acb88f40b2f2fb59f9bbbddacc26f5f35e6e089d482412b

  • SHA512

    8f8ea1a975da476079ce455b7c3aff3d73b6fc7335ecdbe72e405edf2e2001d8149e846b78131d414e7dc2fa295fc71f253381f4a5f8c5b17e73b7138877a9a3

  • SSDEEP

    6144:KcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37isDLDv:KcW7KEZlPzCy37iKvv

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

novo

C2

sasaws.zapto.org:1980

Mutex

DC_MUTEX-4BT5S32

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    4FCqUKN81kX8

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d5e91ceb5f7dd8921acb88f40b2f2fb59f9bbbddacc26f5f35e6e089d482412b
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections