General

  • Target

    1028-65-0x0000000000400000-0x0000000000479000-memory.dmp

  • Size

    484KB

  • MD5

    ff162176c229982d06796243d9aecf20

  • SHA1

    3503f218712aac48e4c908321f606f81f5ed5d52

  • SHA256

    8d45207dc58179676eaed917a2b0b9ddd5ec37497d0510c0b84ee53a228e63a7

  • SHA512

    f4e729e8842ddefed7349fb8ae9bca6cd8f53c5d930e966648762ab1c6697f9103b16d149336868b65cfe3b7b421715aa214518b5b2ab147cf313d65af257ebc

  • SSDEEP

    12288:s/gg3qMjdnjdla/KZXvoZMdAt6+h+hrWijYKkJj6GmZU:sZ3jsKZiMdAtz+hrbYb6nZ

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6297321364:AAGrqCx2JSNrLhdAS1lpDcwQJhzQ_stCOgM/sendMessage?chat_id=882017182

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1028-65-0x0000000000400000-0x0000000000479000-memory.dmp
    .exe windows x86

    59095c7cacb1d079e92fe30a5fb5351e


    Headers

    Imports

    Sections