General

  • Target

    8979ea519df10a132a3516969306d0591836165155b65468834cf9947b1121c1

  • Size

    252KB

  • MD5

    c0e9eae808f50acbed4d66bc9fbf1d14

  • SHA1

    8ae4ec6a1d68aa5913903f5b65cd1545d34cb735

  • SHA256

    8979ea519df10a132a3516969306d0591836165155b65468834cf9947b1121c1

  • SHA512

    4c60a88771eff931e757bfa3cd558de9b11208eb8a4db9dadb7b0d0df0c0a208915cd5e993281536838aaf34d31bbe580a52f309ea45b2ee33b5a149599525a4

  • SSDEEP

    6144:YcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:YcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Client

C2

proshiftrat.no-ip.org:1604

Mutex

DC_MUTEX-FAZ4CYE

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    gE93KorswUAA

  • install

    true

  • offline_keylogger

    true

  • password

    pokemon99

  • persistence

    true

  • reg_key

    WindowsUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 8979ea519df10a132a3516969306d0591836165155b65468834cf9947b1121c1
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections