General

  • Target

    2956-63-0x0000000000400000-0x0000000000462000-memory.dmp

  • Size

    392KB

  • MD5

    46389b80e197b691084696db3a155e4d

  • SHA1

    63f60d01b9f3175fa6b632bee9463c19ad1fd253

  • SHA256

    51a0b69ab76509cde4ceeb633352a71f8f00f8bf8bf46e833f1c5daa3fa66eb5

  • SHA512

    bc8bf9e13e90dcea0e0aceb34588ca7d844dd7b961695ba013edc70b0d816df5033f8ee69a292de39d2e168319cdd8a8cd4caef38e645335dca59cd13a814dc6

  • SSDEEP

    6144:yb5UHV4nKGGVrUUq9UiW2gE2G4ESd7l/wTq1bH3YvKZUZ7DKx:OkV4nKz//wTq1bH3Yv2e

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6201772437:AAE8z2HCV4dlViF8O7_bVozdyvuR6EkBCPA/sendMessage?chat_id=1909112828

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2956-63-0x0000000000400000-0x0000000000462000-memory.dmp
    .exe windows x86

    0c79aab52e575d3a607010a7ce68fadb


    Headers

    Imports

    Sections