General

  • Target

    invoice.docx.exe

  • Size

    2.0MB

  • Sample

    230830-jmmktaae58

  • MD5

    486cca7db81662acf63137de5e1ea20e

  • SHA1

    2bf5cea8667a493cd94bd485c3f12e58d6912b8e

  • SHA256

    b3f29a2e0aebdad74750ab849e49b7d521e12e361d4bc96aff307dece3f16036

  • SHA512

    f11694c06260401db95856959d44810350fc061da6d28ebbfa0f276e0cf4f61b8314ae65d34a23126a1926b0b137d215cdeb7b9a433de50e770bb1a9f68f5111

  • SSDEEP

    49152:PgWxkesOs5XWNMiP3U2b/HdVbN6ziS2PJ3dXZeuR:Imkets5XWDconN6zfQ5

Score
10/10

Malware Config

Extracted

Family

darkcloud

Attributes

Targets

    • Target

      invoice.docx.exe

    • Size

      2.0MB

    • MD5

      486cca7db81662acf63137de5e1ea20e

    • SHA1

      2bf5cea8667a493cd94bd485c3f12e58d6912b8e

    • SHA256

      b3f29a2e0aebdad74750ab849e49b7d521e12e361d4bc96aff307dece3f16036

    • SHA512

      f11694c06260401db95856959d44810350fc061da6d28ebbfa0f276e0cf4f61b8314ae65d34a23126a1926b0b137d215cdeb7b9a433de50e770bb1a9f68f5111

    • SSDEEP

      49152:PgWxkesOs5XWNMiP3U2b/HdVbN6ziS2PJ3dXZeuR:Imkets5XWDconN6zfQ5

    Score
    10/10
    • DarkCloud

      An information stealer written in Visual Basic.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks