General

  • Target

    2692-12-0x0000000000400000-0x0000000000458000-memory.dmp

  • Size

    352KB

  • Sample

    250310-q7lycaxk18

  • MD5

    425952734e5a472d624563016a018427

  • SHA1

    2c71bc55132e71e5b50f798e8dc05a18617f91f4

  • SHA256

    1289c6d2e5455964d51bbe27b892d71cf2856d0bbf482e4f49813b1d6d3b21cc

  • SHA512

    66a7cec4161dde280a31d95f2822ff3b61bd2a4d2e42fe691012337298f41cd2751f4123791f32fb79f46b62a2a9591d8a9356cb3c5150103893c0544060f2a3

  • SSDEEP

    6144:AI8d1/w5KA81IJ8GpF6nuTmOOUDdtt13DM6rwtXy8CEfXDXp:IjYKkJj6GmZU5tt1dMXy8lf

Score
10/10

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      2692-12-0x0000000000400000-0x0000000000458000-memory.dmp

    • Size

      352KB

    • MD5

      425952734e5a472d624563016a018427

    • SHA1

      2c71bc55132e71e5b50f798e8dc05a18617f91f4

    • SHA256

      1289c6d2e5455964d51bbe27b892d71cf2856d0bbf482e4f49813b1d6d3b21cc

    • SHA512

      66a7cec4161dde280a31d95f2822ff3b61bd2a4d2e42fe691012337298f41cd2751f4123791f32fb79f46b62a2a9591d8a9356cb3c5150103893c0544060f2a3

    • SSDEEP

      6144:AI8d1/w5KA81IJ8GpF6nuTmOOUDdtt13DM6rwtXy8CEfXDXp:IjYKkJj6GmZU5tt1dMXy8lf

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks