General

  • Target

    a6a320b71e6aa975114fab078fdfdb4f075c6ab340d0b2fceda5eef44356d999

  • Size

    249KB

  • MD5

    7935c28acb8afd1473934e16b4894f11

  • SHA1

    68f1ff5af1eae58fd7559628466d314feec43793

  • SHA256

    a6a320b71e6aa975114fab078fdfdb4f075c6ab340d0b2fceda5eef44356d999

  • SHA512

    a4191e1a0f9e1d06f810f1978a1bdda48b98c3ed3e130b84f267cdc3c3c1fce73ea3239ea8049f954f8f7e4577f4793104fef634ec469ee027e88caf2e24a853

  • SSDEEP

    6144:LwT5O7pJmNB6dLY6dCnnsyZLHoaIyv6ocU/qxDS2xDWb3cw7YP:LP+NULZdCn3TbncU2D7Ab3JY

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

sabort.zapto.org:82

Mutex

DC_MUTEX-EEMYQ1M

Attributes
  • gencode

    9zWWEjXqGz3u

  • install

    false

  • offline_keylogger

    true

  • password

    1234

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a6a320b71e6aa975114fab078fdfdb4f075c6ab340d0b2fceda5eef44356d999
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections