General

  • Target

    772-66-0x0000000000400000-0x0000000000474000-memory.dmp

  • Size

    464KB

  • MD5

    1475ae99116f934716ec683954fe29fd

  • SHA1

    0864b979ae6a3337cd61a223f4ee81024fecf10b

  • SHA256

    64766dccf31959f82b64a8a3d32c5e2d3a9a9e396182fc4585a10ba0adcbbd3b

  • SHA512

    b3294a3c10466ddf895dd7aee5910351f32d75d29d09b8c5ef9fdef065cba8ef41774cc9b1de1269a64ee49eb7b7d5dc736bfc998368e8172f58894c7413f65f

  • SSDEEP

    6144:vxjHXJHBeofLPDctHpqTvew4BELBwlVxsX8lFh6QLF8d1/w5KA81IJ8GpF6nuTme:vxjR4ofLPo04xsXY6QijYKkJj6GmZU

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot5747177798:AAGv5MNvuUjtsZ9QlXMkdP6QssoMkGFSw6s/sendMessage?chat_id=805410216

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 772-66-0x0000000000400000-0x0000000000474000-memory.dmp
    .exe windows x86

    86bf44e6e79fdad0760a653106f14f37


    Headers

    Imports

    Sections