General

  • Target

    7c7d3bed980e5a069fd5f08dc4e973e4

  • Size

    350KB

  • MD5

    7c7d3bed980e5a069fd5f08dc4e973e4

  • SHA1

    66252bcb6c16bae9f14cd9f260deab4beb7bc7af

  • SHA256

    3fabe330395cfb0b466424b96b374e3c9c274446d71f50dfb29b74994d48a1a7

  • SHA512

    5c87595ecee39bca97ddc09aa0377aaaf60b0bbc568844d2eac0b49cb630f7b1030e35b509e81071cba25e864d057ab9aeec13658be2489e8351e4fc20d07a01

  • SSDEEP

    6144:8D7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZj+I2hgplSZm:8l8E4w5huat7UovONzbXwsh/NVR

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

5.2.183.82:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    nqS6uyeAuXxS

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 7c7d3bed980e5a069fd5f08dc4e973e4
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections