Behavioral task
behavioral1
Sample
2964-51-0x0000000000C50000-0x00000000016DE000-memory.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2964-51-0x0000000000C50000-0x00000000016DE000-memory.exe
Resource
win10v2004-20250314-en
General
-
Target
2964-51-0x0000000000C50000-0x00000000016DE000-memory.dmp
-
Size
10.6MB
-
MD5
f36c25c2fc13352c6daadede33f04fd5
-
SHA1
0a52b7b2c47cb48f2d7c267942ccb6c630053f23
-
SHA256
60db21eb5a116a3eed7fc5b358f466151cd189e220b4b7472f27de91e96caf62
-
SHA512
eb798faa52947d1b8f4c8d6685b096885294c35fef2649d0529305b0fce112c90dbd6cd38b4e3c5437ee912aee533b3d4e6a5ab4d1987665dd9080283691c1a0
-
SSDEEP
98304:uiO2aMxMCjYZRxIz5fEutEseU39AIrslEd:uLszjcRxhutEseoGM
Malware Config
Extracted
skuld
https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E
Signatures
Files
-
2964-51-0x0000000000C50000-0x00000000016DE000-memory.dmp.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 7.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE