General

  • Target

    b81896d70b02caf77c9493f5408d795429a1ab134fa4e53f10feec175dda3a13

  • Size

    1.2MB

  • Sample

    240510-cevswsff69

  • MD5

    36f72db19f2dcfce99c5bbd28b29cdfd

  • SHA1

    0d0ef7d96da046348c9f1243c9bfe581a78f6935

  • SHA256

    b81896d70b02caf77c9493f5408d795429a1ab134fa4e53f10feec175dda3a13

  • SHA512

    be9f125fb5dedef3f8f0c45c7588ab8fad1aa4e293d87ff2594d2496811d77e20dd73797ff6257f90b564b0c0536b78dd76ea862ff9d45f916184f1037357e43

  • SSDEEP

    24576:W8cdUhI4kKqFas0A132slDtKEBpfqegs21Dx:WXeqKqFaslMEbysIx

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6800672014:AAFjIhthNxpYeDLxh4u9CJvqMfisOhMGH6M/sendMessage?chat_id=6542615755

Targets

    • Target

      b81896d70b02caf77c9493f5408d795429a1ab134fa4e53f10feec175dda3a13

    • Size

      1.2MB

    • MD5

      36f72db19f2dcfce99c5bbd28b29cdfd

    • SHA1

      0d0ef7d96da046348c9f1243c9bfe581a78f6935

    • SHA256

      b81896d70b02caf77c9493f5408d795429a1ab134fa4e53f10feec175dda3a13

    • SHA512

      be9f125fb5dedef3f8f0c45c7588ab8fad1aa4e293d87ff2594d2496811d77e20dd73797ff6257f90b564b0c0536b78dd76ea862ff9d45f916184f1037357e43

    • SSDEEP

      24576:W8cdUhI4kKqFas0A132slDtKEBpfqegs21Dx:WXeqKqFaslMEbysIx

    Score
    10/10
    • DarkCloud

      An information stealer written in Visual Basic.

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables using Telegram Chat Bot

    • UPX dump on OEP (original entry point)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks