General

  • Target

    0aacb151216d6c8b23a59caaa0f54dce5c0c3eb06ba79e349a05b461d56508db

  • Size

    256KB

  • MD5

    18a18e53b50c1c9292c5643170ce1971

  • SHA1

    d339ff27f3b3cde833e26420f46ef2123c3aeeca

  • SHA256

    0aacb151216d6c8b23a59caaa0f54dce5c0c3eb06ba79e349a05b461d56508db

  • SHA512

    d57cc1c6836566609605813e1a145c3e184c4d5fc8c66b086aaed70a8fab19fade2e1cb4c68969d98c5fb87901d4bb2b6c529ded83de8b593b8d25691c8cc39b

  • SSDEEP

    6144:4cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37sZf:4cW7KEZlPzCy37s

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

ak

C2

xinlang.zapto.org:83

Mutex

DC_MUTEX-J69UWN7

Attributes
  • InstallPath

    �ѹ�����������.exe

  • gencode

    8U3Bz8Rf7WUb

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    �ѹ�����������

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 0aacb151216d6c8b23a59caaa0f54dce5c0c3eb06ba79e349a05b461d56508db
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections