General

  • Target

    68fc96d5c5f960966b6d7afd2e52f8e97c31afaa35091bd4656f0f2095217bb7

  • Size

    283KB

  • MD5

    5d3a6ff4d3968270f9f09e351c24cb3c

  • SHA1

    4dbc0b4033cc9174e4fde4c382046205ac44b453

  • SHA256

    68fc96d5c5f960966b6d7afd2e52f8e97c31afaa35091bd4656f0f2095217bb7

  • SHA512

    33904af3e7602c0c586ec1e8a4050ac3b9a5338798c42d94aa9e6317860716b74e28c13896d352a73f3ca0708959b3730dafb94121cb28bedd6424a807493e08

  • SSDEEP

    6144:AcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37+:AcW7KEZlPzCy37+

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

darkcomet3.ddns.net:1604

Mutex

DC_MUTEX-ZJFLPGE

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    J1Dp0ixzbN0M

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 68fc96d5c5f960966b6d7afd2e52f8e97c31afaa35091bd4656f0f2095217bb7
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections