General

  • Target

    e3f833c0bebe0c8847f232616bc66bd7255b37d96e1246ab81999de3b913d1b7

  • Size

    283KB

  • MD5

    e777911708ab0988a5da273bb6ea034f

  • SHA1

    437c98b0ed6cc651176ae40fa54ce345683541d9

  • SHA256

    e3f833c0bebe0c8847f232616bc66bd7255b37d96e1246ab81999de3b913d1b7

  • SHA512

    0cff6b725ea92b4067f11eea36b59ee77ea2ab44a9fa031f26fe81a902ff900a2db4d057b889a0a6f3aa3d0ba26dbda127c681b77385ff01cc5dd9effeb93478

  • SSDEEP

    6144:ccNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37L:ccW7KEZlPzCy37L

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Test

C2

192.168.1.13:1604

Mutex

TestServer

Attributes
  • InstallPath

    test\test.exe

  • gencode

    xEuWuS6zjH2r

  • install

    true

  • offline_keylogger

    true

  • password

    123

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e3f833c0bebe0c8847f232616bc66bd7255b37d96e1246ab81999de3b913d1b7
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections