General

  • Target

    a79f889518c35f593e27b1eab59a066fe953196cddc0b9ac4114d966e3b596ac

  • Size

    784KB

  • MD5

    0d564e476fc7812db303da40e79697d0

  • SHA1

    9b9ae661a250966a18e72ad98abf3d6e0e0d1e8b

  • SHA256

    a79f889518c35f593e27b1eab59a066fe953196cddc0b9ac4114d966e3b596ac

  • SHA512

    98a1747d2688cfeed81e4cfb461b7b4a55cd4943afa81169c8341f98c06846615c95dad82bd1d48f2434230c83faac6ea13f7bacafffcf9aca264ed25da84c4f

  • SSDEEP

    12288:4cW7KEZlPzCy37/J1lrOfUkKlKVWetkuk2QOXAdn8/b5ZdKebJ:0KiRzC01dtIVWetkuk9Owdn8lO

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.30.128:1604

Mutex

DC_MUTEX-888FBA9

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    p5UHrgxwHf0b

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a79f889518c35f593e27b1eab59a066fe953196cddc0b9ac4114d966e3b596ac
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections