General

  • Target

    c7e08ec558b45508aae1cc4f3bac5dabae90c04bbc4786dc7f9a8b8924b8b6e1

  • Size

    255KB

  • MD5

    75dfd3bc671650df6286dcf332f0d10d

  • SHA1

    ecb2defe95da4d2118dfaf276b8d1c3905554b5d

  • SHA256

    c7e08ec558b45508aae1cc4f3bac5dabae90c04bbc4786dc7f9a8b8924b8b6e1

  • SHA512

    36baa254ff3e720f190288e62259aa96c5ab9f44869364525462d5c564732d4ef81bdbfe87db7665338d84094c62da4f51c7e75b4c585d62a7564836f7dd84bf

  • SSDEEP

    6144:ZMg79ZIqzIKS6FiBxZJ0w1lSWdWIYh4XGOwCto:ZMg7wqli7zLXSVIYhJLCto

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

alrdmh1.no-ip.info:1604

Mutex

DC_MUTEX-VXUM673

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    EVd9AbiyZMXQ

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c7e08ec558b45508aae1cc4f3bac5dabae90c04bbc4786dc7f9a8b8924b8b6e1
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections