General

  • Target

    332-63-0x0000000000400000-0x0000000000474000-memory.dmp

  • Size

    464KB

  • MD5

    afce464fd44dbc875b0d313eaf1821d3

  • SHA1

    a82a746dae16528fc6ec70e0fb90cace704accfe

  • SHA256

    53cfa0e7b5c5c5c91844902abc0b9b694c3e1a5d3bc663864dc135c6503a6b81

  • SHA512

    7589be9196eb73bbf83ccd697eb90310f5e6af854bedb903e2a83489f9b8f88b4f9727fc948ac2254ffb5771d94cd6aa6d1d5c907a0a1a0547e20201d752feaf

  • SSDEEP

    6144:vxjHXJHBeofLPDctHpqTvew4BELBwlVxsX8lFh6QL:vxjR4ofLPo04xsXY6Q

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot5747177798:AAGv5MNvuUjtsZ9QlXMkdP6QssoMkGFSw6s/sendMessage?chat_id=805410216

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 332-63-0x0000000000400000-0x0000000000474000-memory.dmp
    .exe windows x86

    86bf44e6e79fdad0760a653106f14f37


    Headers

    Imports

    Sections