Behavioral task
behavioral1
Sample
1940-64-0x0000000000400000-0x0000000000476000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1940-64-0x0000000000400000-0x0000000000476000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1940-64-0x0000000000400000-0x0000000000476000-memory.dmp
-
Size
472KB
-
MD5
bf878f60139753b777972ba8825794ae
-
SHA1
6a30cc7e341c9ec1ef1389e1e221aa162430c2d4
-
SHA256
13a1ff16ae7f7d9c7ae7ad7d7e85d9e69d5c41c7d74398e6aac70a3bf6095ef1
-
SHA512
dfb1ed1cbd7940172d1a119562277f9acdde48c8ef9464f5ae6dd551ca50306c2a445d497294433ed673224fa4db737c2a18bd848c2bafd101e29127a78874e3
-
SSDEEP
12288:d73uyNuB7QJc1wdxVas7Hm4X2RAndjYKkJj6GmZU3CL:q77qHm4X2RclYb6nZkCL
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
Files
-
1940-64-0x0000000000400000-0x0000000000476000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 251KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE