General

  • Target

    f292035db0cbaccf92e5a2f9404f03a0d7eba7f2acfd0ba3126eec2b03e27d54

  • Size

    252KB

  • MD5

    319349a44f2a9df74e3da05f7173d3f0

  • SHA1

    6ddc499dfd8e273b127b43fa71666d0450ff05f9

  • SHA256

    f292035db0cbaccf92e5a2f9404f03a0d7eba7f2acfd0ba3126eec2b03e27d54

  • SHA512

    a1e811c954da4e28057c74492fe2033e677377417262e442afaf643017bfe815886c644675172cf01d6ba0750bdfa0fe417f0143600be5ae11210b0902f70998

  • SSDEEP

    6144:DcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:DcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Asic

C2

162.210.196.161:27015

wizkhalifascookware.no-ip.org:27015

wizkhalifascookware.no-ip.org:420

192.96.203.102:420

Mutex

DC_MUTEX-XMB4JQV

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Cz8cvcabNTDu

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f292035db0cbaccf92e5a2f9404f03a0d7eba7f2acfd0ba3126eec2b03e27d54
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections