General

  • Target

    dae50d94955de6fdc05cb5e6a3b3fd981a36700ba5acc241045e3d1df9520323

  • Size

    289KB

  • MD5

    d33a56314426bd9dd9a63daec4a4cf09

  • SHA1

    a77a112f57f8f13a64acbebd11445dc9956c85c1

  • SHA256

    dae50d94955de6fdc05cb5e6a3b3fd981a36700ba5acc241045e3d1df9520323

  • SHA512

    59c75482007a63fa6db8be79805babe670a8c20bcb8019fca710783696f7773cec0d43bb27c5c4836a87aef9a1914b452878235679d902c4aada6295c481a5a8

  • SSDEEP

    6144:HcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37ICB9:HcW7KEZlPzCy379B9

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

JS

C2

jinxerjinxer.no-ip.biz:1604

Mutex

DC_MUTEX-533DTDS

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    9pMWqXE88h81

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • dae50d94955de6fdc05cb5e6a3b3fd981a36700ba5acc241045e3d1df9520323
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections