General

  • Target

    7e9e036f7743c8204e0d6f9ad1445de7cc9b0f25ea3936b8fe94d051e50efed4

  • Size

    318KB

  • MD5

    c77eab913bb57072d5a822b701c3cd9f

  • SHA1

    0568d7b51c0af30934a60198ba289258b7b8a3a2

  • SHA256

    7e9e036f7743c8204e0d6f9ad1445de7cc9b0f25ea3936b8fe94d051e50efed4

  • SHA512

    7b1d800a0d4de3051d04f0725a6b712e602a5f4a4358ea688a921707b59aea68c1afc5e251ba233736eacb8b5743f9de98c729cecfef46e30843ee2bd09f50c6

  • SSDEEP

    6144:mcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PIfoEcBGx:mcWkbgTYWnYnt/IDYhP3

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

bublic.ddns.net:1604

Mutex

DC_MUTEX-ZG8Z8HM

Attributes
  • InstallPath

    MSDCSC\winlogon.exe

  • gencode

    LssnoeMli7XM

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    winlogon

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 7e9e036f7743c8204e0d6f9ad1445de7cc9b0f25ea3936b8fe94d051e50efed4
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections