General

  • Target

    BANKSLIP_TTCOPY_23340636300773456864-2-20-2024_pdf.com.exe

  • Size

    823KB

  • Sample

    250227-xbazjavvcs

  • MD5

    5c828d093e5e944176ad0ec6962e0bcb

  • SHA1

    e92496a462ca1eb63938e49b434699a6bafbf043

  • SHA256

    68c8ef0e9b37380e0111fc58705884d4f5aa491e25270a2608aaf4568fa98b1f

  • SHA512

    ec303589511bd8a916655c7b84ae83a2575c169733fc43475c27a6b79b4afd2f36999011d7048cefe7eb291bc0af05d66284679664b75434c2a0385657f8cfa2

  • SSDEEP

    24576:fXrqImBCUkwIzhdQYEynSzMB2nUmVLj3pboR9Kbl13:fWIS5YXSU5kj5bow5F

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      BANKSLIP_TTCOPY_23340636300773456864-2-20-2024_pdf.com.exe

    • Size

      823KB

    • MD5

      5c828d093e5e944176ad0ec6962e0bcb

    • SHA1

      e92496a462ca1eb63938e49b434699a6bafbf043

    • SHA256

      68c8ef0e9b37380e0111fc58705884d4f5aa491e25270a2608aaf4568fa98b1f

    • SHA512

      ec303589511bd8a916655c7b84ae83a2575c169733fc43475c27a6b79b4afd2f36999011d7048cefe7eb291bc0af05d66284679664b75434c2a0385657f8cfa2

    • SSDEEP

      24576:fXrqImBCUkwIzhdQYEynSzMB2nUmVLj3pboR9Kbl13:fWIS5YXSU5kj5bow5F

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      3e6bf00b3ac976122f982ae2aadb1c51

    • SHA1

      caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

    • SHA256

      4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

    • SHA512

      1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

    • SSDEEP

      192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks