General

  • Target

    0be06c72a87c33d60f841d0e94add1e174cd4640d72c6609096f685c91ca2e47

  • Size

    625KB

  • MD5

    d8671e5bc30085f728b202e62c60443c

  • SHA1

    44c1d2fc83f72afd16a61468e930216e29fdc711

  • SHA256

    0be06c72a87c33d60f841d0e94add1e174cd4640d72c6609096f685c91ca2e47

  • SHA512

    3307c49c162b0bca38ff18398112194a10da61f01798ac11fcd4bbcbdb01d83dea204c6d232d9b1ee4d1c7c29033e708f3d5e16a5b91a0f2aaa8cf6480aa58ba

  • SSDEEP

    6144:dcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37OJF5CkA/+5a6d+JY:dcW7KEZlPzCy37OyoK6

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

digitalseuz.ddns.net:1604

Mutex

DC_MUTEX-QBRL44L

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    uySQcWo6pSLp

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 0be06c72a87c33d60f841d0e94add1e174cd4640d72c6609096f685c91ca2e47
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections