General

  • Target

    64697e40a2868815283d640a824c7d51711a96e8ee43d72a9f223d41fae38009

  • Size

    349KB

  • MD5

    2d09507370a40086893946c9eecabe4b

  • SHA1

    5e26f8afcc7f7dae39a5520a23b6d8e336391935

  • SHA256

    64697e40a2868815283d640a824c7d51711a96e8ee43d72a9f223d41fae38009

  • SHA512

    b114492430b2151dc9c8be33655e8665aaf1d16067fd8c03f13842e8f2d3c19ec31cf9b8141e2d5e656b7fb4b1646a920ad04a86c4c37432f82ea68c805e87fb

  • SSDEEP

    6144:lcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37U2fd/y:lcW7KEZlPzCy37dK

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.1.32:1604

91.88.197.158:1604

Mutex

DC_MUTEX-8EQWL0V

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    zmBZ0XTkwStv

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 64697e40a2868815283d640a824c7d51711a96e8ee43d72a9f223d41fae38009
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections