General

  • Target

    f31e2fb6c51c5cf4766ebf80e3c8cc0885332d96c2a8d9495a1c46c96e6b6ecb

  • Size

    2.2MB

  • MD5

    b81ff15e515846604118f955940ae05c

  • SHA1

    40412f581a2a8a397397be53112b8a78b7da40a3

  • SHA256

    f31e2fb6c51c5cf4766ebf80e3c8cc0885332d96c2a8d9495a1c46c96e6b6ecb

  • SHA512

    7ce794ce59175f5e9a2b4560b6b8da59f960a8103012031e169ec66c36705f842ae236f4297b4d6586605532aa0c1aed0654964671e321aa634c297caa29d3f3

  • SSDEEP

    6144:wcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37kK:wcW7KEZlPzCy37n

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest1

C2

ebulacandy.zapto.org:1604

92.210.64.82:1604

169.254.137.220:1604

127.0.0.1:1604

Mutex

DC_MUTEX-PHGFMWL

Attributes
  • gencode

    eraqaS7bKA3g

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f31e2fb6c51c5cf4766ebf80e3c8cc0885332d96c2a8d9495a1c46c96e6b6ecb
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections