General

  • Target

    b7d2176ff9ac42eac22d807f8d9e1e66d158f7b4d0f352ba988a447448f01415

  • Size

    264KB

  • MD5

    d815641ecaba50daefbe9112431c10ec

  • SHA1

    3f2de42ccd82a30300a1c6345541101b57019560

  • SHA256

    b7d2176ff9ac42eac22d807f8d9e1e66d158f7b4d0f352ba988a447448f01415

  • SHA512

    99c1d86093ecb217ec42a84cebe47eb20e5f76acf9e979ea10cba27ad776bb7e90d79a23469703d02c39723c5ce0d96c134d3db6626f396dacc48854841bb167

  • SSDEEP

    6144:WwT5O7pJmNB6dLY6dCnnsyZLHoaIyv6ocU/qxDS2xDWb3cuh9:WP+NULZdCn3TbncU2D7Ab3J7

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

new

C2

legolas8.no-ip.biz:1604

Mutex

DC_MUTEX-2DS0WZ2

Attributes
  • InstallPath

    MSDCSC\desktop.exe

  • gencode

    3R00lMmzC7aS

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • b7d2176ff9ac42eac22d807f8d9e1e66d158f7b4d0f352ba988a447448f01415
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections