General

  • Target

    1996-11-0x0000000000400000-0x0000000000458000-memory.dmp

  • Size

    352KB

  • Sample

    250310-qhs1cswwat

  • MD5

    390f8830a2c6271b7e82d55d1ee80299

  • SHA1

    eb994dd513f19ae9393e940139455eb3faab9510

  • SHA256

    0a221bfcca47dcd9c6637e6fd5e700581c63be35e73e3c18f98b62c2dcd95ccf

  • SHA512

    d5278b74d376bf51468822726a362d8866b4695e8ac6467ce52a9248df7d8be1f9f49a69bbc15e4d5bf2e4f5624fad9be6408d92c45d507b8fef1313a6afb5cd

  • SSDEEP

    6144:g8d1/w5KA81IJ8GpF6nuTmOOU6cp9OtPjMarw9HyMCPfXLu:DjYKkJj6GmZU1p9Otl8HyMmf

Score
10/10

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      1996-11-0x0000000000400000-0x0000000000458000-memory.dmp

    • Size

      352KB

    • MD5

      390f8830a2c6271b7e82d55d1ee80299

    • SHA1

      eb994dd513f19ae9393e940139455eb3faab9510

    • SHA256

      0a221bfcca47dcd9c6637e6fd5e700581c63be35e73e3c18f98b62c2dcd95ccf

    • SHA512

      d5278b74d376bf51468822726a362d8866b4695e8ac6467ce52a9248df7d8be1f9f49a69bbc15e4d5bf2e4f5624fad9be6408d92c45d507b8fef1313a6afb5cd

    • SSDEEP

      6144:g8d1/w5KA81IJ8GpF6nuTmOOU6cp9OtPjMarw9HyMCPfXLu:DjYKkJj6GmZU1p9Otl8HyMmf

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks