General

  • Target

    64225317a07f54129983d6de3e9f812527fda771fdadd06950639d80b0a79ce7.exe

  • Size

    1.2MB

  • Sample

    240605-bym2qaba72

  • MD5

    79253b6aebbd7fc0f18d8885fd857723

  • SHA1

    bf854b0075beb88e6aeb6b98b863ab4742914f87

  • SHA256

    64225317a07f54129983d6de3e9f812527fda771fdadd06950639d80b0a79ce7

  • SHA512

    8df0504e72a83c0651deca2dd47dd47b06e9b5fa1df2d285c08ef5b29b9e86c2639416f671b33ae9ae4014cc6914b20fa0726a0459c074ac57bb5c31434c0ad2

  • SSDEEP

    24576:1AHnh+eWsN3skA4RV1Hom2KXMmHa6C+0Vtj1Z+EbrDeU5:kh+ZkldoPK8Ya6C+0bpcafp

Score
10/10

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot7151528784:AAFbcms5s5mObSYwvv7y4FgZaar6LzjX7NE/sendMessage?chat_id=5483672364

Targets

    • Target

      64225317a07f54129983d6de3e9f812527fda771fdadd06950639d80b0a79ce7.exe

    • Size

      1.2MB

    • MD5

      79253b6aebbd7fc0f18d8885fd857723

    • SHA1

      bf854b0075beb88e6aeb6b98b863ab4742914f87

    • SHA256

      64225317a07f54129983d6de3e9f812527fda771fdadd06950639d80b0a79ce7

    • SHA512

      8df0504e72a83c0651deca2dd47dd47b06e9b5fa1df2d285c08ef5b29b9e86c2639416f671b33ae9ae4014cc6914b20fa0726a0459c074ac57bb5c31434c0ad2

    • SSDEEP

      24576:1AHnh+eWsN3skA4RV1Hom2KXMmHa6C+0Vtj1Z+EbrDeU5:kh+ZkldoPK8Ya6C+0bpcafp

    Score
    10/10
    • DarkCloud

      An information stealer written in Visual Basic.

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables using Telegram Chat Bot

    • UPX dump on OEP (original entry point)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks