General

  • Target

    a94ad52e59a0bac461e4d9df597e5022e453b116db7492cd5e528584fd9a43b8

  • Size

    283KB

  • MD5

    21f112dffa22245e6b338747c8976930

  • SHA1

    f20121444c7a9b682a1d05010be56c2ef1798270

  • SHA256

    a94ad52e59a0bac461e4d9df597e5022e453b116db7492cd5e528584fd9a43b8

  • SHA512

    10177bf25f114ec83226557db43b4c1698a0f1fc03569eb4cb0b4d3f59f6d89dc2a48dd11a20e354af71ddd1056c2547bac792e806af51951ab6d86768c1ee71

  • SSDEEP

    6144:zcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37l:zcW7KEZlPzCy37l

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

127.0.0.1:4444

Mutex

DC_MUTEX-KT2FTNQ

Attributes
  • gencode

    mtGg3XmPzaEP

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a94ad52e59a0bac461e4d9df597e5022e453b116db7492cd5e528584fd9a43b8
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections