General

  • Target

    fef6bfc42fa7ac9ce6dbdc6224109871d304b2a33ae59d60ec1dad5e32d6247c

  • Size

    251KB

  • MD5

    ba667f8afbee31215dd39b89b61eb648

  • SHA1

    826c4fb2b22ee693d363e72df91b3f8a7c971be0

  • SHA256

    fef6bfc42fa7ac9ce6dbdc6224109871d304b2a33ae59d60ec1dad5e32d6247c

  • SHA512

    155aa02f49160085b9f89ffac78a17e091fb149d881139da90380b900cd1c1b579119cc81253014c3f71e3603f6f39ab040f574fffe9f5fe4aa3ef54ccfa4768

  • SSDEEP

    6144:JcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL375:JcW7KEZlPzCy375

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

87.252.71.150:1604

192.168.1.3:1604

Mutex

DC_MUTEX-X7S7G34

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    aQEcpLzrAjBY

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • fef6bfc42fa7ac9ce6dbdc6224109871d304b2a33ae59d60ec1dad5e32d6247c
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections