General

  • Target

    2764-120-0x0000000000400000-0x000000000046E000-memory.dmp

  • Size

    440KB

  • MD5

    4a10934c4eb37c8098dc6052d05e8e47

  • SHA1

    ee7b56414cab12190ea6509fc11f481534357789

  • SHA256

    01c1a8eb5fdaad821125a9a361c109fcb447767d9ffb8362a3a15bf2c9a513f4

  • SHA512

    e950660973eebfd3054719d0f00a82b1b50aff84831d8674e984e778f6ebdf40a8265c54379e8e71f8341b9b71349d22e1a0cb2ca424a1c7a804583b0db6d523

  • SSDEEP

    6144:GPXZqqZPvMxUW7xmCZoICacUC+0YGGYwMS5mzemlOIGprIGIUDnit5Cv1f2LD5iP:JqZ1W758zemlOIGprv7DGO0EMB

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6062190835:AAFarBYBv-mQ3aLxNEnTAnblGK2thSsO8vQ/sendMessage?chat_id=1891775258

Signatures

  • Darkcloud family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2764-120-0x0000000000400000-0x000000000046E000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    31e0d72c3d1d9c2e87bd259235c4a085


    Headers

    Imports

    Sections