General

  • Target

    e9bb7d14bc5630241246b4ce65c1552a18fb6dd301321e790c4d61171e6cb946

  • Size

    350KB

  • MD5

    37c67e1532fa270d25d0c1a3f81f6d59

  • SHA1

    8f35d699227e0a84099ab6a723529e94d951cbf7

  • SHA256

    e9bb7d14bc5630241246b4ce65c1552a18fb6dd301321e790c4d61171e6cb946

  • SHA512

    b9710be9b6541eddf3679650017411df9fdfdbe9372d3de7ed17d5b61a0da450db53088fd956c1efcc05c7a0161eb9ddc1bcecb2c4876304c367fd3d1cc1e4af

  • SSDEEP

    6144:1D7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZ3bZ:1l8E4w5huat7UovONzbXwTb

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

tayfun.no-ip.org:5445

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    skEKWR5X5MDV

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e9bb7d14bc5630241246b4ce65c1552a18fb6dd301321e790c4d61171e6cb946
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections