General

  • Target

    MTM-PO2411.exe

  • Size

    988KB

  • Sample

    240710-gprw7ssflc

  • MD5

    9267e8b607ea3e73b823eaae7a1fa4a6

  • SHA1

    cc148743e384280e87050a6f02f28625ead5c11e

  • SHA256

    51b91109d6f022b088c42ca6d7ce0ea03a02ca7b27e8911b907c21cd04a768a8

  • SHA512

    01481ad109bd83fbf5dd01f8bcef2e38d64b2ffac78286f03052be71e9c7a4315dd579f87673b5e5aa5d00c75ae45a7855bb84019e8ce2914cf36b91b9a9072b

  • SSDEEP

    24576:S2SnKuTZEeNbkqvCbI6l7XUomqQ+H7rziwEBh0pL:S22KKEeN1OD7XUdqQgylup

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot5723230539:AAHXr6rmQsEsq1CdwKBxLF-mnANEsBE4mYk

Targets

    • Target

      MTM-PO2411.exe

    • Size

      988KB

    • MD5

      9267e8b607ea3e73b823eaae7a1fa4a6

    • SHA1

      cc148743e384280e87050a6f02f28625ead5c11e

    • SHA256

      51b91109d6f022b088c42ca6d7ce0ea03a02ca7b27e8911b907c21cd04a768a8

    • SHA512

      01481ad109bd83fbf5dd01f8bcef2e38d64b2ffac78286f03052be71e9c7a4315dd579f87673b5e5aa5d00c75ae45a7855bb84019e8ce2914cf36b91b9a9072b

    • SSDEEP

      24576:S2SnKuTZEeNbkqvCbI6l7XUomqQ+H7rziwEBh0pL:S22KKEeN1OD7XUdqQgylup

    • DarkCloud

      An information stealer written in Visual Basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks