General

  • Target

    1404-142-0x0000000000400000-0x0000000000462000-memory.dmp

  • Size

    392KB

  • MD5

    da28c284b5110506d152a9e70d877232

  • SHA1

    5e17f5d853d07c274a82e5399e46419bb81dc7e0

  • SHA256

    394b5507dddd8151d944db8db8e9dd7857c62aecd21d0a700c8db57120db4c06

  • SHA512

    4fe0b9ce3bc82c6422e9ea0f122ca7062db3698af8bca2637b111d185f4c013a5163eff04fb2b34398636c3ed071447ff34a97cc6af4129923596d847467874e

  • SSDEEP

    12288:OkV4nKz//wTq1bH3Yv2eBjYKkJj6GmZU:Ogz9m2eJYb6nZ

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6201772437:AAE8z2HCV4dlViF8O7_bVozdyvuR6EkBCPA/sendMessage?chat_id=1909112828

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1404-142-0x0000000000400000-0x0000000000462000-memory.dmp
    .exe windows x86

    0c79aab52e575d3a607010a7ce68fadb


    Headers

    Imports

    Sections