General

  • Target

    server.exe

  • Size

    251KB

  • MD5

    47731cd0798812d6011c699e00ffede5

  • SHA1

    4c85db0c10638d2be4e3e7139623a1fad5e8ecb3

  • SHA256

    c6667b2149aba1a396948c3bf92156e7c977eac53c97949a7bea53c942ef44a7

  • SHA512

    38873df9dbe525caf01460a4bccc0c4d7c48ce8eac4d36243624e7edec82def8af3398b5a967c5d78907eaf309f5d199ce82f4bcdda011ca8c898a315c565ce1

  • SSDEEP

    6144:KcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37m:KcW7KEZlPzCy37

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

Sazan

C2

5.tcp.eu.ngrok.io:12547

Mutex

DC_MUTEX-5K6HH9F

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    JSfprjnnJBsr

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • server.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections