Behavioral task
behavioral1
Sample
1780-53-0x0000000000AD0000-0x000000000155E000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1780-53-0x0000000000AD0000-0x000000000155E000-memory.exe
Resource
win10v2004-20250314-en
General
-
Target
1780-53-0x0000000000AD0000-0x000000000155E000-memory.dmp
-
Size
10.6MB
-
MD5
9af9f4a840f1fe330252c330374dbd59
-
SHA1
271917356a361bfe7b759a094fcf1945a50d8e3d
-
SHA256
2408adb38cdcced75febc63851826e56f353f4b5b90e8ab00a0e90f2be42753a
-
SHA512
8f6b6b6a4b3e576ebf18e2e02112365ce2db3d1e780668baca15a01784e5f0104591d689b4dcd544b72a5dc4d4356ce5224b97770268ea52d3187e62e6d1acbd
-
SSDEEP
98304:GiO2aMxMCjYZRxIz5fEutEseU35AIrsRE:GLszjcRxhutEseoqY
Malware Config
Extracted
skuld
https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E
Signatures
Files
-
1780-53-0x0000000000AD0000-0x000000000155E000-memory.dmp.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 7.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE