General

  • Target

    d54e71c9d6a5f71ebe3abea2a2e6eeac9a4411ad426e32b7cbd69891fc1b3a74

  • Size

    251KB

  • MD5

    0b2fe494a530e5fd0a01dca2e358f52e

  • SHA1

    544155a3d2f73c415f582edf7a563fe7c7a64b51

  • SHA256

    d54e71c9d6a5f71ebe3abea2a2e6eeac9a4411ad426e32b7cbd69891fc1b3a74

  • SHA512

    dfaa515dce6897cd0c211539e65bdf353be320db2e150647df59ca0ebe1a7bca5ced2e9f67065b49aff220ce9bef65382667c49c278a49d4bbc6c0b04d4d3c50

  • SSDEEP

    6144:TcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:TcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

davidbednar.duckdns.org:8005

Mutex

DC_MUTEX-U9BCL5T

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ZywFBFo8ZVC2

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d54e71c9d6a5f71ebe3abea2a2e6eeac9a4411ad426e32b7cbd69891fc1b3a74
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections