General

  • Target

    cc57f5b7bcf8704c016e9c16ef27bb71176b4130f08f2af22f4555ef01238046

  • Size

    264KB

  • MD5

    2790190d6fe87798d4997bba437c7930

  • SHA1

    b0d32347d6f5fe28a6685bd70dc1c672d24bef57

  • SHA256

    cc57f5b7bcf8704c016e9c16ef27bb71176b4130f08f2af22f4555ef01238046

  • SHA512

    d3227d4e9c58819fdb11556b3c9d3702a0933314c11c47c928b3c4230b8507690276a43083bd8870a64913397534daa96d61d8261707781b8ee198b97686464f

  • SSDEEP

    6144:fSae2HYvzUCVh9EchkQKDSaGMfD7XeaZmmYGb:NevXnh1abff9mS

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

bublic.ddns.net:1604

Mutex

DC_MUTEX-ZG8Z8HM

Attributes
  • InstallPath

    MSDCSC\winlogon.exe

  • gencode

    LssnoeMli7XM

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    winlogon

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • cc57f5b7bcf8704c016e9c16ef27bb71176b4130f08f2af22f4555ef01238046
    .rar
  • Cheat.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections