General

  • Target

    1548-210-0x0000000000400000-0x0000000000853000-memory.dmp

  • Size

    4.3MB

  • MD5

    bc76e0a855f604ced1e873e0aeef8a2e

  • SHA1

    7ef1b5ab3653b187a23eed47adceb311f14d399f

  • SHA256

    0700bd5a61c1ac02ac9ca75410876eb134fb5596804836600396302b66baf5b4

  • SHA512

    27502ca96b85f1d78008d6bbe0a09ffa6a8e20c9e67bacd4e08aeff29376ee8b84cd7862daf35be4edb4e0a11e1ac37c5a9b6569b6eb9ebd93f1be24a7cd4521

  • SSDEEP

    98304:8QU/vUMczSwPp0UMAKZd2SEQUMCZOr1ECUMmZOr1EOUMO0ZuLVEAUMSZpq2E:8QyXrAsd2SEG0Or1EswOr1E4JuLVEWEa

Malware Config

Extracted

Family

darkcomet

Botnet

New-July-July4-02

C2

dgorijan20785.hopto.org:35800

Mutex

DC_MUTEX-JFYU2BC

Attributes
  • gencode

    UkVkDi2EZxxn

  • install

    false

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    false

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1548-210-0x0000000000400000-0x0000000000853000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections