General

  • Target

    6903d3e9e617ea9821140cb850f91f66bf149f153972cafa346c3957904be00e

  • Size

    428KB

  • MD5

    3030dae991bb4d251e265c786fe77cc5

  • SHA1

    38302d853517fe93e7bb5b9e8718fe03e8cff9f9

  • SHA256

    6903d3e9e617ea9821140cb850f91f66bf149f153972cafa346c3957904be00e

  • SHA512

    973ded7638db14fbd03514862aa3243beb28cb6731251616a928019c4963ce716e616d318117ce005fc4e5bd9628a88df3f69921c10911bf64bd463448230fa2

  • SSDEEP

    12288:L6tY1DN6YwhmP5EKPCysflbs3urAjYKkJj6GmZU:L6m57wS2lbs3G2Yb6nZ

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot6179013510:AAEcFzYQte4j59p28OFVJ5I7TKu-BqJOCLM/sendMessage?chat_id=5287667476

Signatures

  • Darkcloud family
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables using Telegram Chat Bot 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6903d3e9e617ea9821140cb850f91f66bf149f153972cafa346c3957904be00e
    .exe windows:4 windows x86 arch:x86

    e75504db37f2e67529594bb62222f2f0


    Headers

    Imports

    Sections