General

  • Target

    2728-69-0x0000000000400000-0x0000000000478000-memory.dmp

  • Size

    480KB

  • MD5

    90359a0f7acac272e17db2d65ae3496e

  • SHA1

    9d7250c7fec0622833cb82fa86f1771c6028741f

  • SHA256

    35d8e299be9753f4f74f1e14dd5bdd73444de83110064bdc51527ac2a6ababca

  • SHA512

    8827343db9deb3424efaf07a68dab60c4cc349f17e0da912008dc38c2960812ca97ed5ba3510fa314a13e669bb50fde3d8d39c0f7134457dd36f98ee101fa156

  • SSDEEP

    6144:X9oJmMjbuNp58+C7kHB5V1gRlV3QnGyFX31N36/ItgP2xAot9BTdnaOYKBiLKDoY:XSmMj6NRC7oI/ItgP2xAOld+P4GiRGd

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot1934251866:AAHQ4gMhLxMk3PU1o074pz2lcaY8-WjTQb4/sendMessage?chat_id=1644584536

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2728-69-0x0000000000400000-0x0000000000478000-memory.dmp
    .exe windows x86

    f04087517a52194138f935fd462dce1a


    Headers

    Imports

    Sections