General

  • Target

    0a5a191f175ca321195ccc863e81bd8b6a4c17ab0f3728faf37b279d160a850d

  • Size

    416KB

  • MD5

    17feb9e0f31cb64a2f6d1dc36e4e6462

  • SHA1

    fb108af1978408ecf13319611a7dd942e7119509

  • SHA256

    0a5a191f175ca321195ccc863e81bd8b6a4c17ab0f3728faf37b279d160a850d

  • SHA512

    833ca46a23d292348cb65f623385236aeba2041783a49c26c3c548d27074f0162616c69cc2ce0e2a59c0ba38a9e83d28bcdc7ede0de2064c0a60c2187436da0f

  • SSDEEP

    6144:2cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37U0MZWM:2cW7KEZlPzCy37U0aWM

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

JS

C2

jinxerjinxer.no-ip.biz:1604

Mutex

DC_MUTEX-5BBMURB

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    7FyeJoWhoZKf

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 0a5a191f175ca321195ccc863e81bd8b6a4c17ab0f3728faf37b279d160a850d
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections