General

  • Target

    1984-61-0x0000000000400000-0x000000000046B000-memory.dmp

  • Size

    428KB

  • MD5

    d876f5913190d8eacbca3e85a21a8d50

  • SHA1

    8c8ed626bd7780208083a2326caf118a8a8f261e

  • SHA256

    a4fc3d54b0d0d12d434a0da4d50869f4f6c5e954c29e0f4a4b7a331bb209b779

  • SHA512

    d9767cc597371999a2559f4a5027e14a7ef221141b8aa01d831b84bf690e32ad7d6778ff37d03e09a57e6d35fc498165e12d5fd7aaeb8d7fc3a5989710e6448d

  • SSDEEP

    12288:2wZfpbAPgbOUXPP4nDgIIOYTMXNTFjYKkJj6GmZU:2wZzb/kYTMXBNYb6nZ

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6179013510:AAEcFzYQte4j59p28OFVJ5I7TKu-BqJOCLM/sendMessage?chat_id=5287667476

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1984-61-0x0000000000400000-0x000000000046B000-memory.dmp
    .exe windows x86

    94e3dffcfd34f52a9a3710c07c52a742


    Headers

    Imports

    Sections