General

  • Target

    f26431b364aec3c4491af918a5822325096ff849afeaf6b2e010830716243a96

  • Size

    349KB

  • MD5

    00341beb5e8da5d8233d4d0aeccb23ec

  • SHA1

    35b70103fd9b1c36d0b40023c917124fbe21bc15

  • SHA256

    f26431b364aec3c4491af918a5822325096ff849afeaf6b2e010830716243a96

  • SHA512

    888c31ebc7b2a4f4fc51eb2fc562e278cc2dbeb6eab00b226bf6cf5546b9df9c1dbbecf022be4fc41661280931a027860cfc1050539c25ff5ead0266940fb766

  • SSDEEP

    6144:RcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37ni:RcW7KEZlPzCy37i

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

188.121.203.95:8000

Mutex

DC_MUTEX-Q90LR71

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    VPj37fwn2gjv

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f26431b364aec3c4491af918a5822325096ff849afeaf6b2e010830716243a96
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections