General

  • Target

    c6d6b33557e9f71bfd7ae7c8fa4b99627e4d1439965bd50ddddfec8a7a0a78eb

  • Size

    261KB

  • MD5

    fafb8f0c046acb149cadd466a78d4245

  • SHA1

    798430ffb105221a01dd03bc77176f0a09493d1e

  • SHA256

    c6d6b33557e9f71bfd7ae7c8fa4b99627e4d1439965bd50ddddfec8a7a0a78eb

  • SHA512

    0fb7993cc62eb2872dc550eb0d5a5c3334574c330aa8bca384dc24e972ff4a79e3cfbcd49eed89b08b540ae6cbb64342c2fc7a245053b892e50710e11a54854b

  • SSDEEP

    6144:lcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37n:lcW7KEZlPzCy37n

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

1

C2

igr15.noip.me:1604

Mutex

DC_MUTEX-79LYMZP

Attributes
  • InstallPath

    app\CCleaner\CCleaner-resident.exe

  • gencode

    psvXkE5w4SBk

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MSUpdate

Signatures

  • Darkcomet family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • c6d6b33557e9f71bfd7ae7c8fa4b99627e4d1439965bd50ddddfec8a7a0a78eb
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections