General

  • Target

    7b4594b4e4bd4e6c04f0f595cbe83176_JaffaCakes118

  • Size

    481KB

  • MD5

    7b4594b4e4bd4e6c04f0f595cbe83176

  • SHA1

    99f009e0aa9c8381c33cd1c15a262e69b6bd0ac9

  • SHA256

    e8281de33a98377a2f482f952f5edac2002129656cec81bb9887f42f85d54a47

  • SHA512

    d3f1442fa1e5fff4e5047928fe9e3244a186fd8c47fe2c5021454fcc21dc706bba0439e22f603d610c78faba8b7052a8f18df2a22223652a570eb7a394136bdb

  • SSDEEP

    12288:Sl8E4w5huat7UovONzbXw9b1ZDBpXLJSIsD:wdhHwNzbXir9G

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

jpg

C2

wormmm.zapto.org:1604

Mutex

DC_MUTEX-FP4VHDL

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Tzqw9TkaSLTW

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 7b4594b4e4bd4e6c04f0f595cbe83176_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections