General

  • Target

    tmp

  • Size

    251KB

  • MD5

    8da896375e5d33e7d7486dbf71d008d8

  • SHA1

    c3582c010c4d9ab5142e886409e005b2c497b95b

  • SHA256

    1adceb6315ba775ecb5019cfae72b39a06351c098895e3e9370c3fce3712459d

  • SHA512

    482883769fa753bf923010e12f0a714de039a8a05a56f37155b4bea9386acb7150cb335859355f5bb4ac93adaacefecceb3a6ddb1225b4a9d35d87bf8bc2f8e5

  • SSDEEP

    6144:jcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37Cy:jcW7KEZlPzCy37f

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

80.85.154.180:1456

Mutex

DC_MUTEX-96M7W90

Attributes
  • gencode

    0N6v44S6oBbf

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • tmp
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections