Resubmissions

28/02/2025, 21:44

250228-1lks9szlx8 10

28/02/2025, 21:37

250228-1gjqeazks7 10

General

  • Target

    QTN#78646_PROPOSAL REQUEST.exe

  • Size

    804KB

  • Sample

    250228-1gjqeazks7

  • MD5

    3e5a1f7ce2befd3a26d7f30eecb645b9

  • SHA1

    8308a296720e8a3742b31802ea81c41298f9a458

  • SHA256

    893039d592597c2bf4983bc290cca56c538d60927298efda69afe9079b9e373c

  • SHA512

    979d76b3ddb42edf4049eff029f0dfd8131adb8bcb19efb7f690f1c7e30b635d48dbd260c784d0ee98fde412e32c94caf62b88e357763ad117fd9b1a57f6949b

  • SSDEEP

    12288:nRbFXrqIm/JCUkwIs18h8+kT9XSbI9Q5vy/Jmf7PCaM7qE0mcF4cPUuwc2HdnOI:fXrqImBCUkwIzhcNyIQakf7U/0PvwTcI

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      QTN#78646_PROPOSAL REQUEST.exe

    • Size

      804KB

    • MD5

      3e5a1f7ce2befd3a26d7f30eecb645b9

    • SHA1

      8308a296720e8a3742b31802ea81c41298f9a458

    • SHA256

      893039d592597c2bf4983bc290cca56c538d60927298efda69afe9079b9e373c

    • SHA512

      979d76b3ddb42edf4049eff029f0dfd8131adb8bcb19efb7f690f1c7e30b635d48dbd260c784d0ee98fde412e32c94caf62b88e357763ad117fd9b1a57f6949b

    • SSDEEP

      12288:nRbFXrqIm/JCUkwIs18h8+kT9XSbI9Q5vy/Jmf7PCaM7qE0mcF4cPUuwc2HdnOI:fXrqImBCUkwIzhcNyIQakf7U/0PvwTcI

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks