General

  • Target

    676-61-0x0000000000400000-0x0000000000466000-memory.dmp

  • Size

    408KB

  • MD5

    a2e0e31694ca339007ceff57f03065ac

  • SHA1

    90f9b5fe64437ffa51217c5770990892a9108990

  • SHA256

    965c275789378329059843f71b1ec9635ea47934f159d2d1597488e007fc75ae

  • SHA512

    3fb7ce3298b27396a17f52824c5380c6728e809b63ff84a4f22c50801e6d071d0dc80c8aa6836b68c764127f5e1b110539a8b14d2fdfeaa5d779ec2bde57ac94

  • SSDEEP

    12288:SkIhFJwurAYDL+OafK1G8ZZ35QjYKkJj6GmZU:OhkuhE8ZZ35GYb6nZ

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6220361269:AAGBxdMGbKgYomsopvpOOfxLM-AsLa8opRM/sendMessage?chat_id=1275946058

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 676-61-0x0000000000400000-0x0000000000466000-memory.dmp
    .exe windows x86

    4e6d24c90379497a49bf9b5256e5646a


    Headers

    Imports

    Sections