General

  • Target

    c22813c184261467138f5bab19d855cfbd9e90700afb52b15b992648ac3dfb19

  • Size

    351KB

  • MD5

    8ff3fb4da0792904172bb6c227fcf0d4

  • SHA1

    bf1de5bbde018d52bff0f24caab2e85336c174ce

  • SHA256

    c22813c184261467138f5bab19d855cfbd9e90700afb52b15b992648ac3dfb19

  • SHA512

    a7bbd0c0b72753f8d0096deffaa34cdec693ff8e353e19737c676a2506e2d7be8c57828c9f79c128352caea4612851090ce1760f1881d9b3bc6b8bec6fe6a2b8

  • SSDEEP

    6144:ZD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZYY5LLTMdWnh:Zl8E4w5huat7UovONzbXwsYdMd0QZh9u

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

host

C2

1337load.no-ip.biz:1337

Mutex

DC_MUTEX-MVSPR2W

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ZuzR8XPrrQ5z

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c22813c184261467138f5bab19d855cfbd9e90700afb52b15b992648ac3dfb19
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections