General

  • Target

    2364-13-0x0000000000400000-0x0000000000460000-memory.dmp

  • Size

    384KB

  • MD5

    7eefcc6a7a6803d4124ac80e69fd8bee

  • SHA1

    1036c2491672e0a11a1fe5dac8f193025253c6ae

  • SHA256

    5b943150f744ca9c238126b60ad761cff3bcbab86918ae8c68acfc4601eb439f

  • SHA512

    83846b7af321e2aceee5f6d36c2f83e84bb4886971cc8091152e8f5a4fce2211f9fadd4bd2f0922df22dbd95928bd1d8ea421203e777a20d52ffaee8883297cc

  • SSDEEP

    6144:6bGn80rliMWNh6Ftr8ZwiwcJI6P7omrLQ3tayBBMGpqP+K88d1/w5KA81IJ8GpFx:6in80rliMQ6Ftr8Zwi1hP7LOtay0w/Gg

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6843160964:AAF3CXe6SpPYlr6PSxsfXFuMMbuXMIkkNtE/sendMessage?chat_id=5302361040

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2364-13-0x0000000000400000-0x0000000000460000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    fc9cf63b0ad8c5564dca39f1bb53e81e


    Headers

    Imports

    Sections