General

  • Target

    edae29887bf11f1582e20fc56c21d4a088bc9efea72a6e1a6af022d67c5290dd

  • Size

    283KB

  • MD5

    6ba3271039633581d3a9791bd9d1cf3f

  • SHA1

    c8f17bbe367578ac7913e18a14be1cfd4c3914b4

  • SHA256

    edae29887bf11f1582e20fc56c21d4a088bc9efea72a6e1a6af022d67c5290dd

  • SHA512

    82b0633990311e2f699d07cccf73f5e2409aaea64304d50ef2b6a702ca15af5807551460fd6e98e237fdfa46bcfe96f9a9d42311f8b21bffab118e3dde1a09d4

  • SSDEEP

    6144:ZcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0Piw:ZcWkbgTYWnYnt/IDYhPL

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-314T3QY

Attributes
  • gencode

    Ykf81xucYhEH

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • edae29887bf11f1582e20fc56c21d4a088bc9efea72a6e1a6af022d67c5290dd
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections