General

  • Target

    f119271d27ffcda77950c4f0db52ce1c6a4fba48a30f2830c91f45294799457b

  • Size

    349KB

  • MD5

    348b072ee00c3549cd8701d730f4b1dc

  • SHA1

    c9aea2ebe9afd0c773cebe590c8e6ace39b46476

  • SHA256

    f119271d27ffcda77950c4f0db52ce1c6a4fba48a30f2830c91f45294799457b

  • SHA512

    e5ea3dae0cc47e4adc1656c4655b61331ce62b74997f884e8b53501c37639e20adff0d5741cd5198244aca6ad313f6e6df4d040394d644ea37b36b26d2b3e5c0

  • SSDEEP

    6144:1cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37Pbd/y:1cW7KEZlPzCy37PZK

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

Lampard.no-ip.org:1604

Mutex

DC_MUTEX-RBWEX8R

Attributes
  • gencode

    PowG2vAEoTVo

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f119271d27ffcda77950c4f0db52ce1c6a4fba48a30f2830c91f45294799457b
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections