Behavioral task
behavioral1
Sample
2076-2-0x0000000000400000-0x0000000000A66000-memory.exe
Resource
win7-20231129-en
General
-
Target
2076-2-0x0000000000400000-0x0000000000A66000-memory.dmp
-
Size
6.4MB
-
MD5
821fbf1cb275030eb449f2c5290cdd37
-
SHA1
e460ac1236a8c407a3ecc994b07e6698342cb0ad
-
SHA256
9d3697cc644d5ad01b1def3df1c4f17cc768fefe47acf1f32826d77ef9976590
-
SHA512
54d9010219e5835fd50750957dfe6885399e8076ead05e58b90155856c95dde5b109fc5f9659c879b395e259015b23c75255a547e5ab257f91f88546d21f7f0f
-
SSDEEP
98304:9vD99re2J0FhJW0PUT2VNT9Nob1tY73myju2NLv+ZtQBRLLomoUMMd0GLXz:9vD99rEnZNz3m2v+DQBxLomozMuu
Malware Config
Extracted
darkcloud
https://api.telegram.org/bot6361371678:AAH7b9uIkhwP1TBt8t78VwxXD7LXjsOcbYk/sendMessage?chat_id=5527518337
Signatures
Files
-
2076-2-0x0000000000400000-0x0000000000A66000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 89KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 7B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ