General

  • Target

    81a955c38b0a5d763002c59054844fcc30d61918259159991a6369ca9199fd56

  • Size

    252KB

  • MD5

    b74660b4c8e47a8aa2bf2717055dd307

  • SHA1

    5f4ff3f54ed0a69dad66c40886152d1a79b6e79d

  • SHA256

    81a955c38b0a5d763002c59054844fcc30d61918259159991a6369ca9199fd56

  • SHA512

    8422288c834fb5374076b55141ec9ac15960b3ee2ba7a906f694929b0bed4dbd7ed43db5490c18a2de9588684d02af82cdeffef2c0f4754845e8b8d49e073cb3

  • SSDEEP

    6144:8cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37VX:8cW7KEZlPzCy37B

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest15

C2

kalitoor.ddns.net:2468

kalitoor.ddns.net:1357

Mutex

X1K3LKA15CPC33

Attributes
  • InstallPath

    WINDS\system.exe

  • gencode

    z8g3vHLKaCla

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    WindowsUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 81a955c38b0a5d763002c59054844fcc30d61918259159991a6369ca9199fd56
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections