Behavioral task
behavioral1
Sample
2812-48-0x0000000001290000-0x0000000001D1E000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2812-48-0x0000000001290000-0x0000000001D1E000-memory.exe
Resource
win10v2004-20250314-en
General
-
Target
2812-48-0x0000000001290000-0x0000000001D1E000-memory.dmp
-
Size
10.6MB
-
MD5
591949d7b478ba451c680016adfe8bbe
-
SHA1
cb877f2afe81ea2f84acbd5fa4b3e73c5b340884
-
SHA256
5c94e85e1e1cdea6ae8aa84200fa114a2fb3a821ae5249c9af11d9546c4fbeed
-
SHA512
f76d692c54a23be6635fc0f93b310e53ec16a2409bb9a70a26e86226387a34006087e1c025941eba1a5b912a271374d73fae45d802fbd1aa3ce724a4a1c8e57a
-
SSDEEP
98304:5iO2aMxMCjYZRxIz5fEutEseU3AAIrskE:5LszjcRxhutEseozb
Malware Config
Extracted
skuld
https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E
Signatures
Files
-
2812-48-0x0000000001290000-0x0000000001D1E000-memory.dmp.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 7.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE