General

  • Target

    2744-11-0x0000000000400000-0x0000000000458000-memory.dmp

  • Size

    352KB

  • Sample

    250310-rg86maxyav

  • MD5

    1860c54d7531855a95f76aa3807572a9

  • SHA1

    f2eb58bb48112d63e79ef919d0cf76ae3acec358

  • SHA256

    4dfee8653094f675f3c5c8315f833d4ca15c8d67a97a16713ced50fc31613e7d

  • SHA512

    305dc51175bcc447a49b98faf2a6282242cd4873dcc26c1908f7d73b293c0badfba1c109dbd504e5fe117a5d505810e3f9cdcf9ea1d9d4a8e5a2099d75938302

  • SSDEEP

    6144:m8d1/w5KA81IJ8GpF6nuTmOOU0Qt0BPBchn0dGyUjekuh+:VjYKkJj6GmZU0Qt014sGyUiF

Score
10/10

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.dorasanat.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    K0BRhY6s,&aN

Targets

    • Target

      2744-11-0x0000000000400000-0x0000000000458000-memory.dmp

    • Size

      352KB

    • MD5

      1860c54d7531855a95f76aa3807572a9

    • SHA1

      f2eb58bb48112d63e79ef919d0cf76ae3acec358

    • SHA256

      4dfee8653094f675f3c5c8315f833d4ca15c8d67a97a16713ced50fc31613e7d

    • SHA512

      305dc51175bcc447a49b98faf2a6282242cd4873dcc26c1908f7d73b293c0badfba1c109dbd504e5fe117a5d505810e3f9cdcf9ea1d9d4a8e5a2099d75938302

    • SSDEEP

      6144:m8d1/w5KA81IJ8GpF6nuTmOOU0Qt0BPBchn0dGyUjekuh+:VjYKkJj6GmZU0Qt014sGyUiF

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks