General

  • Target

    f698881cad74b8979e0e29a598aca6502b9b91b8610d7f69830933c0417bbde4

  • Size

    283KB

  • MD5

    20a25ea0afb00b77b0e5fd203203bfa7

  • SHA1

    aa3239cb526b9655f04419a9d52ac346e3a4f9cb

  • SHA256

    f698881cad74b8979e0e29a598aca6502b9b91b8610d7f69830933c0417bbde4

  • SHA512

    8d699ea2a08741154212e5ef76b8ebc77735add84c8d0020206dc2fb7b71f585c0410fffafb1eaa65173b2c88ad4a65e132ac0c5dc1001d4b1b55399034318b7

  • SSDEEP

    6144:8cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37hr:8cW7KEZlPzCy37t

Malware Config

Extracted

Family

darkcomet

Botnet

INDETECTABLES

C2

127.0.0.1:8329

munv1.no-ip.biz:8329

Mutex

DC_MUTEX-5L98UVR

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    gjCV24QlfPr1

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f698881cad74b8979e0e29a598aca6502b9b91b8610d7f69830933c0417bbde4
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections