General

  • Target

    2812-48-0x0000000001290000-0x0000000001D1E000-memory.dmp

  • Size

    10.6MB

  • MD5

    591949d7b478ba451c680016adfe8bbe

  • SHA1

    cb877f2afe81ea2f84acbd5fa4b3e73c5b340884

  • SHA256

    5c94e85e1e1cdea6ae8aa84200fa114a2fb3a821ae5249c9af11d9546c4fbeed

  • SHA512

    f76d692c54a23be6635fc0f93b310e53ec16a2409bb9a70a26e86226387a34006087e1c025941eba1a5b912a271374d73fae45d802fbd1aa3ce724a4a1c8e57a

  • SSDEEP

    98304:5iO2aMxMCjYZRxIz5fEutEseU3AAIrskE:5LszjcRxhutEseozb

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E

Signatures

  • Skuld family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2812-48-0x0000000001290000-0x0000000001D1E000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections