General

  • Target

    6f1fc512bd1a9d03b02295cbea4843104046ed8dfd05937458e10af97de43943

  • Size

    335KB

  • MD5

    4465d1be156c2d7d7db47f4f7bd52191

  • SHA1

    d84ca56b4feb11d4f1279e2505332e5b1ae5b975

  • SHA256

    6f1fc512bd1a9d03b02295cbea4843104046ed8dfd05937458e10af97de43943

  • SHA512

    7b66bb3f5b975410a9da6aa34708c861cb97d736581c8f1b8807d5dc10f01c7a59c80b3953002d872c46a4cf32f2674b64e2d43917966d0e14e732874295a626

  • SSDEEP

    6144:tBJVqu5jxRl+t6Ge0qw0kw9+Ks9a8/7z6ln5A0yGhahSMTL8Qn:ttqwjxRl+t6GfL7zcISMH8Qn

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

aezzeh.no-ip.biz:1604

Mutex

DC_MUTEX-45QK8US

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    swyc7oNH9YE7

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 6f1fc512bd1a9d03b02295cbea4843104046ed8dfd05937458e10af97de43943
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections