Behavioral task
behavioral1
Sample
10684-17847-0x0000000000D90000-0x000000000181E000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
10684-17847-0x0000000000D90000-0x000000000181E000-memory.exe
Resource
win10v2004-20250314-en
General
-
Target
10684-17847-0x0000000000D90000-0x000000000181E000-memory.dmp
-
Size
10.6MB
-
MD5
dce4434bf9f955231c09439c9d8c8d59
-
SHA1
a8f9f51f1a746a16b4cb25f508c66b86b1714f55
-
SHA256
3d922813189e42f5cc2cf5f708e0091d2e3ed42f9e583541fdab88a7682297fc
-
SHA512
a0196e7e17f6f526dd6a09025df951ec2d069b4594466c1ee76ace35f614b1a4c9f19a023f62cf6816fc66db7cf262990da85d16cb23724b1a2484f985a1d77b
-
SSDEEP
98304:iiO2aMxMCjYZRxIz5fEutEseU3hAIrsYE:iLszjcRxhutEseoCD
Malware Config
Extracted
skuld
https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E
Signatures
Files
-
10684-17847-0x0000000000D90000-0x000000000181E000-memory.dmp.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 7.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE