General

  • Target

    1305261a64890954599fb2d7578a5b20047ea415d00d5a219f7ae06c21c72a52

  • Size

    283KB

  • MD5

    dd58cddd601ba0d1d7fc157136a8a1c5

  • SHA1

    344292fb97107016fb925d93ff81cea9a7e92493

  • SHA256

    1305261a64890954599fb2d7578a5b20047ea415d00d5a219f7ae06c21c72a52

  • SHA512

    111e77ca531c6c5ccbb4d27308a4209014b9503a220e1e0b48bb63cde0200013a03963ebaa6e63bb0957e4038c5709e4017228934f74a16e1f3517381257a872

  • SSDEEP

    6144:7cNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0P0GT:7cWkbgTYWnYnt/IDYhP0GT

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

220

C2

strateg.ddns.net:220

Mutex

DC_MUTEX-17TCUZ8

Attributes
  • InstallPath

    MSDCSC\explorer.exe

  • gencode

    ECU92camneaf

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 1305261a64890954599fb2d7578a5b20047ea415d00d5a219f7ae06c21c72a52
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections