Behavioral task
behavioral1
Sample
2576-64-0x0000000000400000-0x0000000000476000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2576-64-0x0000000000400000-0x0000000000476000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2576-64-0x0000000000400000-0x0000000000476000-memory.dmp
-
Size
472KB
-
MD5
4c7830110c21d5f9ed6a6aef827068b3
-
SHA1
c12b62716cf820f34cccccf580c126298b6d0b94
-
SHA256
849c06d427f6eed230ee752ad6a357009f9d90812d1d47be493d9bc9c79f353c
-
SHA512
f247d5f2e20650feedc95d6d3c7b4c7897ebd560e6c52bc69a620eb01ddbdc3f861883f42d7b6d7b7188c82e50f3cfe95e6f1f88ea5a27538df984bc9da5b855
-
SSDEEP
12288:d73uyNuB7QJc1wdxVas7Hm4X2RAndjYKkJj6GmZU3CL:q77qHm4X2RclYb6nZkCL
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
Files
-
2576-64-0x0000000000400000-0x0000000000476000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 251KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE