General

  • Target

    1780-53-0x0000000000AD0000-0x000000000155E000-memory.dmp

  • Size

    10.6MB

  • MD5

    9af9f4a840f1fe330252c330374dbd59

  • SHA1

    271917356a361bfe7b759a094fcf1945a50d8e3d

  • SHA256

    2408adb38cdcced75febc63851826e56f353f4b5b90e8ab00a0e90f2be42753a

  • SHA512

    8f6b6b6a4b3e576ebf18e2e02112365ce2db3d1e780668baca15a01784e5f0104591d689b4dcd544b72a5dc4d4356ce5224b97770268ea52d3187e62e6d1acbd

  • SSDEEP

    98304:GiO2aMxMCjYZRxIz5fEutEseU35AIrsRE:GLszjcRxhutEseoqY

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E

Signatures

  • Skuld family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1780-53-0x0000000000AD0000-0x000000000155E000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections