General

  • Target

    Remittance Slip -4,324.62 C42237.7z

  • Size

    799KB

  • Sample

    230719-pg6z6aed46

  • MD5

    56aa5336bc3838a2bcbf9b3f44f2f2bd

  • SHA1

    6e9c9f628d93b3ed0e4d8d892515b59b2bd8df6e

  • SHA256

    16bdc0c558c63fb3cfe920de4b08fde88403587e6a3080a600ee027b2272ccf1

  • SHA512

    9e4d6a2a2bc3847398ddcbfaf1594596e6e7c95dc1feb267d7f6bd4fce0f0fcddec4477c7dd32350fb2af1a1887a06befcfb68a3cfbfad11f08d465e9b0d5bd7

  • SSDEEP

    24576:r1KRd5tVQv/u1qQ+0hZTbNF0ZiiDSt/odV7:8tVQnKqQrhlbN6ZiiDdP

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6201772437:AAE8z2HCV4dlViF8O7_bVozdyvuR6EkBCPA/sendMessage?chat_id=1909112828

Targets

    • Target

      Remittance Slip -4,324.62 C42237.exe

    • Size

      861KB

    • MD5

      95e7e6d6c22760ceded6dae93e09e2da

    • SHA1

      59aa6178468103a0231168ca90ddfb7f6b478b1e

    • SHA256

      39c3188d01340e7dde2d297ac10dca13ec5fb3299ac57c2259dd81007660206f

    • SHA512

      dd94463a71b95095586a36c433c32730774b6df64880263e4aad5144af9c7485669175a9e5cce5eff172b72c00a03d05e4565c4271fee9af5bebb7dc49231dc7

    • SSDEEP

      24576:XPYPgIQBIE16I7wTuWm1qv0AW5zdEN87GuWj:XwxQBvMI7wTZuqv0RldENGGuW

    Score
    10/10
    • DarkCloud

      An information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks