General

  • Target

    2764-11-0x0000000000400000-0x000000000045C000-memory.dmp

  • Size

    368KB

  • Sample

    250310-qfrdrawlv7

  • MD5

    591dc83ddb6d65f6593f14a851224c54

  • SHA1

    b31fcf1dbf16496c596870f2d669b9432c992f50

  • SHA256

    96ad598edcf4cccab0a7edad34a25362853ee30e426217f9788caec09a69ff7a

  • SHA512

    05deeddd9232cb52207bf46a6b6006eeaad407fdd1ec4bb980ba7ba9d45b807843645ae870f9495ebde3697bfa3fae074216ea58e5b6f4d560fa6342ce7fce9c

  • SSDEEP

    6144:7k8d1/w5KA81IJ8GpF6nuTmOOUL8UNZkkxS5XuoyspluBbJ9qNfOySLFh+s3:LjYKkJj6GmZUL8UNZEQoyquJJ9OSx3

Score
10/10

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.jeepcommerce.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Rz9wwXn!z9Vf

Targets

    • Target

      2764-11-0x0000000000400000-0x000000000045C000-memory.dmp

    • Size

      368KB

    • MD5

      591dc83ddb6d65f6593f14a851224c54

    • SHA1

      b31fcf1dbf16496c596870f2d669b9432c992f50

    • SHA256

      96ad598edcf4cccab0a7edad34a25362853ee30e426217f9788caec09a69ff7a

    • SHA512

      05deeddd9232cb52207bf46a6b6006eeaad407fdd1ec4bb980ba7ba9d45b807843645ae870f9495ebde3697bfa3fae074216ea58e5b6f4d560fa6342ce7fce9c

    • SSDEEP

      6144:7k8d1/w5KA81IJ8GpF6nuTmOOUL8UNZkkxS5XuoyspluBbJ9qNfOySLFh+s3:LjYKkJj6GmZUL8UNZEQoyquJJ9OSx3

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks