General

  • Target

    0bf4800618849191a85f1efd4d83704f5b542808514de6626c9796020e85312b

  • Size

    251KB

  • MD5

    52a058d5e47f27ef6138731807df6a8a

  • SHA1

    845e9947bfc812ddeebe2891dd66001e13aeb557

  • SHA256

    0bf4800618849191a85f1efd4d83704f5b542808514de6626c9796020e85312b

  • SHA512

    f76c7f9f05c66d78aa37226cea0ef91411dd68e6288c4aeaad4a244189cfe240072b9b633d41c43bbdb19b9db2e8048ada49e7b0f9aee9309810e2c2930d515b

  • SSDEEP

    6144:7cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37xE:7cW7KEZlPzCy37x

Malware Config

Extracted

Family

darkcomet

Botnet

MicrosoftUpdate

C2

41.58.29.207:9090

127.0.0.1:9090

12065656516.gotdns.ch:9090

Mutex

DC_MUTEX-HGK1HCB

Attributes
  • gencode

    fFDxLg5b8viJ

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 0bf4800618849191a85f1efd4d83704f5b542808514de6626c9796020e85312b
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections