General

  • Target

    3.zip

  • Size

    714KB

  • Sample

    250226-re83vasky2

  • MD5

    dd180ed0f763b97b26e3cf3e2e8170f7

  • SHA1

    e01ba3868e449f32f2c714b727bdd64faac1c3e0

  • SHA256

    fc82e2618aade9981710c3e12694337040cd7195b1b8eafcf095a263393f201c

  • SHA512

    a912c17b9ac515e20a6edd5b60f39713ba7d2737e3b7961f4960b826a8600851a73b516d8b2664cb59ac3a35c109cf4f9db0500375a74dd83cf03ceb2b4786cb

  • SSDEEP

    12288:OfgyFNdmrZhFqbRFENF250Mp/2Butu+0jJsBavn2tzMOckzLJy8jY:OfBFN4rxsv4GJhtxBXWOfIqY

Malware Config

Extracted

Family

darkcloud

Attributes

Targets

    • Target

      fact34567890-0987651.exe

    • Size

      740KB

    • MD5

      a5e2d3302000da6ea68b650efb356ba8

    • SHA1

      bac1ae702bf83f06dc57e2bf372b823f95cd5722

    • SHA256

      d5d74b300a57fbccea71a5cc653042c19157f3e5e4070bcd29991caedd8f9e5f

    • SHA512

      59fa914aca5729d2e2d388c4c8ff3fc09eea52556cbc68d746125ec16c61f9464abc9c1988833374bd6ba07e75878e375dd139820fafd3e3a8dd4f964c1d23e0

    • SSDEEP

      12288:IquErHF6xC9D6DmR1J98w4oknqOOCyQfNLt2Bmtm209JA1avdgjZMgcCDnEr:Jrl6kD68JmlotQfr7tP136gzw

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks