General

  • Target

    dc4adc8ac3a46bc4cf987c81c9bdb338994bb77ffaf9ee803bb3987600ea7a12.exe

  • Size

    757KB

  • Sample

    241016-gctj9svfqh

  • MD5

    cb75401fbf3b650e22ffb84e62662a47

  • SHA1

    236dc3db3deddd91bb3b6f13654fecbe60bf5d12

  • SHA256

    dc4adc8ac3a46bc4cf987c81c9bdb338994bb77ffaf9ee803bb3987600ea7a12

  • SHA512

    fbd8747bde9c36c41f012c2f1b73a862fb0b15644388ec1067210cb110c53f60a450b930d662d5ff5e84dc9083f52dca25840b8b8c5ae4c4a2ec96abf3c827f1

  • SSDEEP

    12288:XUUSSZBUJdhDH6PyuPTw9eaT/b0sABP4ELsg4+2dRYtEBdzLD22PL6gSszZMi6dR:XqSZqrhDaaoTw9tLDmLsg4+ERfBdfVGh

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot8171626722:AAGIo9PvRpFrmWwamfv0SMURLy1PCYFG9a8/sendMessage?chat_id=6542615755

Targets

    • Target

      dc4adc8ac3a46bc4cf987c81c9bdb338994bb77ffaf9ee803bb3987600ea7a12.exe

    • Size

      757KB

    • MD5

      cb75401fbf3b650e22ffb84e62662a47

    • SHA1

      236dc3db3deddd91bb3b6f13654fecbe60bf5d12

    • SHA256

      dc4adc8ac3a46bc4cf987c81c9bdb338994bb77ffaf9ee803bb3987600ea7a12

    • SHA512

      fbd8747bde9c36c41f012c2f1b73a862fb0b15644388ec1067210cb110c53f60a450b930d662d5ff5e84dc9083f52dca25840b8b8c5ae4c4a2ec96abf3c827f1

    • SSDEEP

      12288:XUUSSZBUJdhDH6PyuPTw9eaT/b0sABP4ELsg4+2dRYtEBdzLD22PL6gSszZMi6dR:XqSZqrhDaaoTw9tLDmLsg4+ERfBdfVGh

    • DarkCloud

      An information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks