General

  • Target

    32c0b27c4f94765af4554f87361cb2c69b5498bcc415abd553ee8671e2e5ca3f

  • Size

    768KB

  • Sample

    240417-r757nach78

  • MD5

    147846df172860770bbe010bf0f867c6

  • SHA1

    c7d5066e306b745bbe88c02821857afdbcef4cd0

  • SHA256

    32c0b27c4f94765af4554f87361cb2c69b5498bcc415abd553ee8671e2e5ca3f

  • SHA512

    38218b3d4fa8e7e41b23b75ddc37519affb7fad9bd01915942e3759d9ad6926c60990357271930ea33bd1c4688b66a0fe42e78c3d17e0bae78823b4b4dd80340

  • SSDEEP

    12288:QuDF2W9wyA00vYbC+yMixGujGx/lgXPSaBXDWviL2rb7xjPa:Qel9wy5HbC3jG9cqyDu7xjPa

Score
10/10

Malware Config

Extracted

Family

darkcloud

Attributes
  • email_from

    capping@ronaldsmith.loan

  • email_to

    rosa@ronaldsmith.loan

Targets

    • Target

      63fecafde6aed53ac007e7a69372eda93dfa06143552644ceee7f032886c1c58.exe

    • Size

      813KB

    • MD5

      6a4af4b23d3234eab5622ffb9f64c5fe

    • SHA1

      fdfad14c00e4fe40ea6fcdef2c42ff053ae2c1c3

    • SHA256

      63fecafde6aed53ac007e7a69372eda93dfa06143552644ceee7f032886c1c58

    • SHA512

      cf95580e39a45bb183bc71ccdb0f923a2a6d95c4048f90e55e332392d44103c97a4347eb620a772e7941f2299d0d5dd3e368211e3336c55cabefb05ef164bb02

    • SSDEEP

      24576:FxuUJuMl4s4KbiWwDHNfwus01NckbrhORP:fv74s4CiWwDtfwILcXR

    Score
    10/10
    • DarkCloud

      An information stealer written in Visual Basic.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks