General

  • Target

    Transferencia.exe

  • Size

    1.0MB

  • Sample

    240502-glathscf86

  • MD5

    fa20018130ae2d51f084e94f5d99bcc6

  • SHA1

    cd080fba396b191094c2f1f40d60c5618df6442b

  • SHA256

    9d0de04e246838edcff53feff522284ffac9de51f55804cf162d088c6aa6f4a7

  • SHA512

    079b1b25cfcfc1ee05519abfba67e6c5c4ecd878b6077cc0f5c1c3f22d08343c484f11e794b4fe4c2af04ca5a5c2d314cda2dbcf7c202cd4cca9fa3d8d9e4347

  • SSDEEP

    12288:uCWD4xZKxzWqvXHYXkX08C5KkpfqeH3cXiyQI7lMHAgfXm:QD4xZKx1XzJWBpfqeHMSw+5

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot7148308455:AAGrdlRzhjt8mx31-dFYXt4kvhbFnphSlSg/sendMessage?chat_id=6542615755

Targets

    • Target

      Transferencia.exe

    • Size

      1.0MB

    • MD5

      fa20018130ae2d51f084e94f5d99bcc6

    • SHA1

      cd080fba396b191094c2f1f40d60c5618df6442b

    • SHA256

      9d0de04e246838edcff53feff522284ffac9de51f55804cf162d088c6aa6f4a7

    • SHA512

      079b1b25cfcfc1ee05519abfba67e6c5c4ecd878b6077cc0f5c1c3f22d08343c484f11e794b4fe4c2af04ca5a5c2d314cda2dbcf7c202cd4cca9fa3d8d9e4347

    • SSDEEP

      12288:uCWD4xZKxzWqvXHYXkX08C5KkpfqeH3cXiyQI7lMHAgfXm:QD4xZKx1XzJWBpfqeHMSw+5

    Score
    10/10
    • DarkCloud

      An information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks