Behavioral task
behavioral1
Sample
1868-65-0x0000000000400000-0x000000000047B000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1868-65-0x0000000000400000-0x000000000047B000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1868-65-0x0000000000400000-0x000000000047B000-memory.dmp
-
Size
492KB
-
MD5
db88dbfbcd16eb6b8ab9c6c2af2dfc48
-
SHA1
d92b3d8a56eb6d6a11dd8db13f75c6d28a46789b
-
SHA256
afaa644927c4d9cf23e0bc14f6641534af5111e06a2a6a59bf9d7ba733538195
-
SHA512
bc50903bf5713ad20d4a53d39e2d9878d4fe381617e1d4b02da46ec266c0d59ca2a1677d6ac3ad85bd22183d55f3b9283764a6fbe329f9a010c262ea13931ad2
-
SSDEEP
12288:DOf6KXEPe4jJw4Pq2888cNoNZL2vt8LCjYKkJj6GmZU3G:K4esJNoNZL2l/Yb6nZ0
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
Files
-
1868-65-0x0000000000400000-0x000000000047B000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 255KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE