Behavioral task
behavioral1
Sample
4316-1364-0x0000000140000000-0x000000014007A000-memory.exe
Resource
win10v2004-20250410-en
General
-
Target
4316-1364-0x0000000140000000-0x000000014007A000-memory.dmp
-
Size
488KB
-
MD5
df1df1d61d135900c56dcc85487416b9
-
SHA1
9506a5559fb16d35b2d113f47cd69e230f64ebbe
-
SHA256
b08b821ae34b3580f60e01a7e3739c4e487d4f96f3e5874f26eacf0f29aaf434
-
SHA512
0a0e2127251ae11cdea78128a5d07fecd807bed9c8934957d9e13edad3a74ab23ccb6f31b0ce9d31bbabcdeea4d71a08cbc883c02d02805ef2083a4b72c781f2
-
SSDEEP
6144:+MdVKz+LuaBM4/1qrbbYTsHYU6Aez8KVWIy/vI/:LLXqrH+RLT9
Malware Config
Extracted
darkvision
toolsdns.ddns.net
Signatures
-
Darkvision family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4316-1364-0x0000000140000000-0x000000014007A000-memory.dmp
Files
-
4316-1364-0x0000000140000000-0x000000014007A000-memory.dmp.exe windows:5 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 223KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ