General

  • Target

    d021a2f6ad016cdbb7fcff545d4bac80c692742f549e31bf99fb506f9ae26248

  • Size

    349KB

  • MD5

    0af231b952dcdda7ce1e656bf7154b8b

  • SHA1

    7e68b91dcc3d0b16b2c90365a6802c5e7b521516

  • SHA256

    d021a2f6ad016cdbb7fcff545d4bac80c692742f549e31bf99fb506f9ae26248

  • SHA512

    2127dfa44d6a1fab9a673411d83c8ebfd84018a3c7822943f14aeec602d29ebfdfb81af1cd18800501e36e663b8f8b996e65853e3ffd373502ef191a830d40f6

  • SSDEEP

    6144:4cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37F:4cW7KEZlPzCy37F

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.0.2:1604

Mutex

DC_MUTEX-6UFV0Z1

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    1ap3h49AgbBJ

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d021a2f6ad016cdbb7fcff545d4bac80c692742f549e31bf99fb506f9ae26248
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections