Behavioral task
behavioral1
Sample
67f025389874285ad223869693aab889d3649a74f8d955098726ac3b872bf840.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
67f025389874285ad223869693aab889d3649a74f8d955098726ac3b872bf840.exe
Resource
win10v2004-20230703-en
General
-
Target
67f025389874285ad223869693aab889d3649a74f8d955098726ac3b872bf840.exe
-
Size
488KB
-
MD5
4cafd28c3d8b329b7c131efd5b3ebb24
-
SHA1
a42e923a1dc056264e3aa9fa1ee7ab97fc3021ec
-
SHA256
67f025389874285ad223869693aab889d3649a74f8d955098726ac3b872bf840
-
SHA512
1c08a85b35c6d3b7f197580f10a797ce5d11649a753c1dd9554e3e677093f95c57d1487cb6ee7269ca80a469b2ce9b88406e5e5f943187ac218c1974d84bcb7a
-
SSDEEP
12288:6Znq9ahuwlWR7Gl9vzZ1dl/LxMrKCqJjYKkJj6GmZUN:GhVvl1dl/lMrK3xYb6nZS
Malware Config
Extracted
darkcloud
https://api.telegram.org/bot6392998330:AAEoU34KkrBXWdYsC0HHJhwWS-tXdCQBgic/sendMessage?chat_id=6386262734
Signatures
Files
-
67f025389874285ad223869693aab889d3649a74f8d955098726ac3b872bf840.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 256KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE