General

  • Target

    10684-17847-0x0000000000D90000-0x000000000181E000-memory.dmp

  • Size

    10.6MB

  • MD5

    dce4434bf9f955231c09439c9d8c8d59

  • SHA1

    a8f9f51f1a746a16b4cb25f508c66b86b1714f55

  • SHA256

    3d922813189e42f5cc2cf5f708e0091d2e3ed42f9e583541fdab88a7682297fc

  • SHA512

    a0196e7e17f6f526dd6a09025df951ec2d069b4594466c1ee76ace35f614b1a4c9f19a023f62cf6816fc66db7cf262990da85d16cb23724b1a2484f985a1d77b

  • SSDEEP

    98304:iiO2aMxMCjYZRxIz5fEutEseU3hAIrsYE:iLszjcRxhutEseoCD

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E

Signatures

  • Skuld family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 10684-17847-0x0000000000D90000-0x000000000181E000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections