General

  • Target

    ee49a7e3f7b1f69bbf2d5d65ba2c2b3118116782284a765f380c0846d324dd00N.exe

  • Size

    349KB

  • MD5

    026881e2c6aec9c7862fc4481fa49790

  • SHA1

    192feeee8a660bb43705217aa069824add92b7a1

  • SHA256

    ee49a7e3f7b1f69bbf2d5d65ba2c2b3118116782284a765f380c0846d324dd00

  • SHA512

    059155d439f43f158c22b95e366918a4392fbf97630484309b354dacc91f1cc1f84edb85a797ef3ee8ae556169b9816c70b8a3d0f8dabdf14652eeee8fc5cd1c

  • SSDEEP

    6144:fcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37Qa+KIOkknUnk3nnU:fcW7KEZlPzCy37r3kknUnk3nnU

Malware Config

Extracted

Family

darkcomet

Botnet

Server FUD

C2

tm77220.no-ip.org:1604

Mutex

DC_MUTEX-2YM4VM4

Attributes
  • InstallPath

    CCleanerPC\CCleaner.exe

  • gencode

    3gRwzeWR8jFt

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    CCleanerPC

Signatures

  • Darkcomet family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • ee49a7e3f7b1f69bbf2d5d65ba2c2b3118116782284a765f380c0846d324dd00N.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections