General
-
Target
QTN#78646_PROPOSAL REQUEST.exe
-
Size
804KB
-
Sample
250228-1gjqeazks7
-
MD5
3e5a1f7ce2befd3a26d7f30eecb645b9
-
SHA1
8308a296720e8a3742b31802ea81c41298f9a458
-
SHA256
893039d592597c2bf4983bc290cca56c538d60927298efda69afe9079b9e373c
-
SHA512
979d76b3ddb42edf4049eff029f0dfd8131adb8bcb19efb7f690f1c7e30b635d48dbd260c784d0ee98fde412e32c94caf62b88e357763ad117fd9b1a57f6949b
-
SSDEEP
12288:nRbFXrqIm/JCUkwIs18h8+kT9XSbI9Q5vy/Jmf7PCaM7qE0mcF4cPUuwc2HdnOI:fXrqImBCUkwIzhcNyIQakf7U/0PvwTcI
Static task
static1
Behavioral task
behavioral1
Sample
QTN#78646_PROPOSAL REQUEST.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcloud
Protocol: ftp- Host:
@StrFtpServer - Port:
21 - Username:
@StrFtpUser - Password:
@StrFtpPass
Targets
-
-
Target
QTN#78646_PROPOSAL REQUEST.exe
-
Size
804KB
-
MD5
3e5a1f7ce2befd3a26d7f30eecb645b9
-
SHA1
8308a296720e8a3742b31802ea81c41298f9a458
-
SHA256
893039d592597c2bf4983bc290cca56c538d60927298efda69afe9079b9e373c
-
SHA512
979d76b3ddb42edf4049eff029f0dfd8131adb8bcb19efb7f690f1c7e30b635d48dbd260c784d0ee98fde412e32c94caf62b88e357763ad117fd9b1a57f6949b
-
SSDEEP
12288:nRbFXrqIm/JCUkwIs18h8+kT9XSbI9Q5vy/Jmf7PCaM7qE0mcF4cPUuwc2HdnOI:fXrqImBCUkwIzhcNyIQakf7U/0PvwTcI
-
Darkcloud family
-
Guloader family
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-