General

  • Target

    b640a3fd920b8b865778aef9210ab57c6ff13289448f84c14c5a82cc1c97e9b8

  • Size

    253KB

  • MD5

    4e4458afcdf63fc311a3bd0b5c80a210

  • SHA1

    1393bd2e313471eb0ff6592aee186955ad3bfaff

  • SHA256

    b640a3fd920b8b865778aef9210ab57c6ff13289448f84c14c5a82cc1c97e9b8

  • SHA512

    901a5eb30e53ef13df6c29c981741174a0a3139b6398cc7e88f39472ea2c724d026b642d49d69e8b63ed03131119ab739d3480c6abac02b5a18ca0d5d15d2ff7

  • SSDEEP

    6144:bcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37ubgl:bcW7KEZlPzCy37u0

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

darkrpms.no-ip.info:1604

Mutex

DC_MUTEX-MHRG2UN

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    pSa8E6ZAQrE2

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b640a3fd920b8b865778aef9210ab57c6ff13289448f84c14c5a82cc1c97e9b8
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections