General

  • Target

    b037db8f6d357ec803f53f92da635ec326458ef5e4d7b59e6a7ea02b23ba2eef

  • Size

    251KB

  • MD5

    39b9efb05955b2d6964eb28435c4ef34

  • SHA1

    b2883e78ee968c6378db24035b69c6a44ed45b43

  • SHA256

    b037db8f6d357ec803f53f92da635ec326458ef5e4d7b59e6a7ea02b23ba2eef

  • SHA512

    b75079a14536d2ca00362e97bc0534d42e6061cde4d36fe53601dbcda0f0d25853d28bd12a497bb150db3ab739bc93bb4b2d374216c7fa95c020da94c8c3b7e1

  • SSDEEP

    6144:tcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37k0:tcW7KEZlPzCy377

Malware Config

Extracted

Family

darkcomet

Botnet

baropoulo.no-ip.org

C2

127.0.0.1:1604

Mutex

DC_MUTEX-35V2H5G

Attributes
  • gencode

    NucxJJctKknK

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b037db8f6d357ec803f53f92da635ec326458ef5e4d7b59e6a7ea02b23ba2eef
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections