General

  • Target

    26af8b5d942b4c8dfdad39576294cb03721028cc9a774ce9c97167f69faeef99

  • Size

    283KB

  • MD5

    125cdd60c6fd24a824032b22827e6640

  • SHA1

    ccecf4678aa24dd0f5a17f0b6a477de071159ccd

  • SHA256

    26af8b5d942b4c8dfdad39576294cb03721028cc9a774ce9c97167f69faeef99

  • SHA512

    418cae967ee86a9b04b26f40ac22c9301675ace86b0b660862fae41368df462c81bf2c975400b02f5844385191bb8d2d615d140e5324ac550aab14bb59cd0a8c

  • SSDEEP

    6144:LcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37U9:LcW7KEZlPzCy37u

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.2.116:1604

Mutex

DC_MUTEX-PFMJHA4

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    kKUBp16dAQDZ

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 26af8b5d942b4c8dfdad39576294cb03721028cc9a774ce9c97167f69faeef99
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections