Details
Malware Family DarkComet
Date Added Feb. 1, 2016, 9:47 p.m.
MD5 f01fbcdb4cadf3fb94c124bc86a86e48
Sha256 eb0d30457865acc582373a7861956bb5a8491f1d93db7e011c19eb9d4f49bbdc
Robot Robots lovingly delivered by robohash.org
Config Sections
FWB 0
SID Guest16
FTPPASS 0123456789
CHIDEF 1
CHIDED 1
PERS 1
FTPROOT /
SH10 1
KEYNAME winupdater
MUTEX DC_MUTEX-F54S21D
FILEATTRIB 2
EDTDATE 16/04/2007
NETDATA 192.168.1.7:1604
GENCODE Q7V=wyZt%9lW
EDTPATH Windupdt\winupdate.exe
MSGICON 64
FTPPORT 21
INSTALL 1
PERSINST 1
DIRATTRIB 0
SH1 1
SH3 1
SH4 1
SH5 1
SH6 1
SH7 1
SH8 1
SH9 1
FTPSIZE 10
FAKEMSG 1
MULTIBIND 1
CHANGEDATE 1
PDNS 127.0.0.1:arabian.ddns.net
MSGTITLE Baarl..
FTPUSER username
OVDNS 1
COMBOPATH 0
FTPHOST ftp.yourhost.com
BIND 1
FTPUPLOADK 1
MELT 1
PWD hacker
MSGCORE 4CFC7466656E204F79756E2050656E6365726573696E652047697269FE20596170FD6EFD7A2E2E
OFFLINEK 1
Advertising
VirusTotal

49 out of 55 AV's Identified the sample as Malicious

Virus Total Report

Domain Data
Domain IP Country Code
192.168.1.7 0
Geo Location
Yara Rules
Comments
comments powered by Disqus