Details
FileName | |
---|---|
Malware Family | DarkComet |
Date Added | 2016-04-23 03:00:04 |
MD5 | c9963a901515146cb773b178806661a6 |
Sha256 | 82da6cc0f22f1d3190a348515db1661b7a869a3d5e06f3ca8837a78ef2a50b38 |
Robot | Robots lovingly delivered by robohash.org |
Advertising
Config Data
FTPSIZE | 10 |
---|---|
MUTEX | DC_MUTEX-CVP273V |
SH9 | 1 |
DIRATTRIB | 6 |
FTPPORT | 21 |
CHIDEF | 1 |
SID | All |
CHANGEDATE | 0 |
MSGTITLE | Could not load |
FTPROOT | / |
MULTIBIND | 1 |
OFFLINEK | 1 |
KEYNAME | MicroUpdate |
EDTPATH | MSDCSC\msdcsc.exe |
COMBOPATH | 10 |
FILEATTRIB | 6 |
FAKEMSG | 1 |
NETDATA | 164.132.3.114:1604|virus543.ddns.net:1604 |
FTPUPLOADK | 1 |
SH1 | 1 |
FWB | 0 |
PWD | pen123 |
SH3 | 1 |
INSTALL | 1 |
SH10 | 1 |
SH6 | 1 |
MSGCORE | 4572726F723A2030783030303030316663 |
PERSINST | 1 |
OVDNS | 1 |
SH8 | 1 |
MSGICON | 16 |
CHIDED | 1 |
PERS | 1 |
PDNS | 127.0.0.1:localhost |
MELT | 1 |
GENCODE | 2NUtwszDCVEd |
BIND | 1 |
SH7 | 1 |
FTPPASS | hacker911911 |
FTPHOST | ftp.drivehq.com |
FTPUSER | hadesisback |
SH4 | 1 |
SH5 | 1 |
EDTDATE | 16/04/2015 |
Virustotal
50 out of 56 AV Engines identified the sample as Malicious.