General

  • Target

    f8bc37abb1e087f5f75571dac8d680fab039b2cf3f9e74ae1bf87cec9f4e81c8

  • Size

    350KB

  • MD5

    5fa24779b9508ff317cd688d93f70e70

  • SHA1

    07f96ca153250de9210066786b4f8fcb7612eafc

  • SHA256

    f8bc37abb1e087f5f75571dac8d680fab039b2cf3f9e74ae1bf87cec9f4e81c8

  • SHA512

    ddd57acbefad6f623bd92a80d3ec0e69aeb64ae1047ede3b403c4efa3e331c967ec4b3198b5ccb24b423cfc719d0598ea6c08ae6e5958c28d129567201b17c1c

  • SSDEEP

    6144:hBJVqu5jxRl+t6Ge0qw0kw9+Ks9a8/7z6lnhHI2hgplSZkOiu9PZ/p3:htqwjxRl+t6GfL7zc1h/NVR

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

setroot.no-ip.biz:4444

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    68pcwmd9ul3n

  • install

    true

  • offline_keylogger

    true

  • password

    6543216969

  • persistence

    true

  • reg_key

    ����������.b

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f8bc37abb1e087f5f75571dac8d680fab039b2cf3f9e74ae1bf87cec9f4e81c8
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections