General

  • Target

    2fe6cbc69ef942c425f78a6a929b8c31279a3f103ed94bde3e4ce827d83812e9

  • Size

    392KB

  • MD5

    8b657e893d319398f44e76ccebe6cf72

  • SHA1

    c8826d65cd2d5a222a7de6ea282e0a58de5e2e6e

  • SHA256

    2fe6cbc69ef942c425f78a6a929b8c31279a3f103ed94bde3e4ce827d83812e9

  • SHA512

    a0e1c0db130d97a93c0b64e39f98d949e375861255d987b4d6c73e3668494bef0de883e783ebbf6ef59dee174e1bf9a4c70630556c14753f4805ff668a2e7121

  • SSDEEP

    6144:icNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37rCZnFSKrIiXVMI2RwTbE/f2liQ:icW7KEZlPzCy37rOQepzbE/fyVV

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

bombsquadbooter.ddns.net:1604

Mutex

DC_MUTEX-XTQFB0V

Attributes
  • gencode

    CyKQYYaaJ9Gw

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2fe6cbc69ef942c425f78a6a929b8c31279a3f103ed94bde3e4ce827d83812e9
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections