General

  • Target

    e6ac139efb03093a0015ddab66d755d99b11c3df870fc0839db794cc246a51b3

  • Size

    731KB

  • MD5

    8240ac445995f36a9984cd067a1355f3

  • SHA1

    40c4d121e1e26234d734a3025e238855699738bc

  • SHA256

    e6ac139efb03093a0015ddab66d755d99b11c3df870fc0839db794cc246a51b3

  • SHA512

    b9b98a553c530c8bd43ae4e2222e314f1bc2d6bdd7e673a48a129d2ed8eaef413aca4b37c19de89875a606a4eb113a5662691796f5bfb4543084909a5300930a

  • SSDEEP

    12288:ok0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/R/:x0QRWoJEfg0oChGdJQbjPbNW5tYeP+GR

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

profile01

C2

127.0.0.1:8080

Mutex

DC_MUTEX-E7GLFBT

Attributes
  • InstallPath

    WindowsUpdate\WindowsUpdate.exe

  • gencode

    KBS8YRlgGA7X

  • install

    true

  • offline_keylogger

    false

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e6ac139efb03093a0015ddab66d755d99b11c3df870fc0839db794cc246a51b3
    .exe windows x86


    Headers

    Sections