Behavioral task
behavioral1
Sample
2136-67-0x0000000000400000-0x000000000047C000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2136-67-0x0000000000400000-0x000000000047C000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2136-67-0x0000000000400000-0x000000000047C000-memory.dmp
-
Size
496KB
-
MD5
d684e150f2e2bf55e682433b763d6eb5
-
SHA1
e95f20d7a0dbc80187076e5be6cd9a15fc638269
-
SHA256
250955ae5ef88a5bae4377821dfaa1834c0e774e125617df518277006d495014
-
SHA512
80b6d7e1a1939d5f5b4493efb62c2d8392bb7d8c14b709ae5ed4f37f157d0dfb989b2410fbf53220624a4c1acb80fac8584e562225e472e81bc2eab5c4cc3773
-
SSDEEP
12288:6DaG88NqWx3CMj21piSU+FfUZ6DWn2jYKkJj6GmZUW:6bNSTU+FfUZEuYYb6nZH
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
Files
-
2136-67-0x0000000000400000-0x000000000047C000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 257KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE