General

  • Target

    016d141ae10e0601b7e3eac1ab8e452c.bin

  • Size

    248KB

  • MD5

    e7f5459e5f1bec9a47b8aeb52773b384

  • SHA1

    05027c3c6e091aa267706965f7e8ed9627dd129a

  • SHA256

    6e51958b6d8afac048bb3490993d02da276f51c773b566a9e729d29dd755b055

  • SHA512

    a7e2cbd53ce4a05dbda6dcbf82335141f1704b41a1f712b211d706f3643fa04f9c78f1cec680a333306ef7267e39885aff6add996b6ee7a39120815ca57f7804

  • SSDEEP

    6144:ABIBhU21jG6yJPugdEK6U5Adt+COuEsyefkKGBUvE:AOQ2NG6Xg96vJOurMnBUvE

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

kostya.ddns.net:1604

kostya.ddns.net:27015

Mutex

DC_MUTEX-871ND55

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    98HmJFR7GLjd

  • install

    true

  • offline_keylogger

    false

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 016d141ae10e0601b7e3eac1ab8e452c.bin
    .zip

    Password: infected

  • 51e12e4db963bd5b2bb2f826767e3bc67d1e3e1f7222b1ede203dd3304efbe51.bin
    .exe windows x86

    Password: infected


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections