General

  • Target

    ab69d6548ccd94133e98d0969a8e50af.bin

  • Size

    808KB

  • Sample

    230503-cdsbdadc99

  • MD5

    bda2b708c66fff2bc3dfe6acafcb01ba

  • SHA1

    97feecf181ff6007eb0eb43ab59372233a8f88d6

  • SHA256

    dd28aadece5caef4540595c8502ab9ed1a7c48062fc744c3b69e5c2e7804b08d

  • SHA512

    e41c59654491a3a623b324a76bd2631df5b2a010b81467fd63587f12d50777557df78d3da3d41e566273119275ba75a279daa4db9b9a4e05303a08d76662e98e

  • SSDEEP

    12288:IsdwE5AKkk/IxF2ZlMZT2GO3GGx5gRBI+AuvkOlpsPFx/EFEdYCDNHK1Imou6MIj:Isdr5jpg23Gz++AykOlr7CpVs6FXPT/

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6220925905:AAFbd3Et4YQi4C1WTvNkPbMsAOdz5c8giT0/sendMessage?chat_id=5463149861

Targets

    • Target

      e8494ad45492e71aa36941a772d0697db87bda82a91f16e69916ad9a4642042d.exe

    • Size

      914KB

    • MD5

      ab69d6548ccd94133e98d0969a8e50af

    • SHA1

      2136d572b134905efd820fef2512c7da501072f5

    • SHA256

      e8494ad45492e71aa36941a772d0697db87bda82a91f16e69916ad9a4642042d

    • SHA512

      8d622ec82cff83c0ed062717d15deed1ae40f132fc93981ec04552494478d692b4e1dc9c4a0d086c13c9eeb8b642b3cf453d67dfb8bb8442ff36165345436b69

    • SSDEEP

      24576:lqm7Kb/PVgWahxsKM5C1oKua6oJXs27t3xQ22:lqoKb/9gT2KYkJTXs27Bxk

    Score
    10/10
    • DarkCloud

      An information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks