General

  • Target

    7314c57ff1b6c869ac761c2c0ad289cac3fb7a67a34fb391b7b8cb0945c431ef

  • Size

    252KB

  • MD5

    0bbf15cc8b5c34ed31347d47fd057690

  • SHA1

    5f82d838c8a77bc5afe5c728d14c8207dbf5a5f6

  • SHA256

    7314c57ff1b6c869ac761c2c0ad289cac3fb7a67a34fb391b7b8cb0945c431ef

  • SHA512

    bedb38417e065fd38810174b34d18684431501d9dd2d461390685b57c13b98e50f300f17d5741aec49516d06a23654a70ac81d8e76d6a2fe10894909871eced6

  • SSDEEP

    6144:VcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:VcW7KEZlPzCy37

Malware Config

Extracted

Family

darkcomet

Botnet

g.console_id

C2

cinlaxe.sytes.net:1604

Mutex

DC_MUTEX-5S6SNHB

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    9RwZWlYddbez

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 7314c57ff1b6c869ac761c2c0ad289cac3fb7a67a34fb391b7b8cb0945c431ef
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections