General

  • Target

    Quote-SA70451153766809567875351061-24_pdf.txz.rar

  • Size

    589KB

  • Sample

    250228-qprqwaztbs

  • MD5

    2280d7e3f4b3a618108b2d097f57f95b

  • SHA1

    ffddf2c4b277b3a6bfd2106757d367215c16d016

  • SHA256

    c44510db966154804a6ca2f3f2c62dd6f42eb01650cd555aff35668f8b591392

  • SHA512

    ee52dd98c14576ae5942346c072e778e6fef5df8e653cc1febbaedcc1f1c129c96b8bebe36ee58bcb452c8c6143a924fa2da8e6c5d5155d9ce814b72db27bf20

  • SSDEEP

    12288:NK1rtf6dop4Co3k3I4kkmCW0gHJAXnr23e4MHnrsLF8+F4z:A1rwoZ8sIXfC4HROLHru4z

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      Quote-SA70451153766809567875351061-24_pdf.exe

    • Size

      809KB

    • MD5

      51493da79f7be2add42abc448ce8ffd1

    • SHA1

      67a7ba517b2061a750167d25489763eb9e1a6a5b

    • SHA256

      bc3f66f7dbab0b0e60bb989d1e53f8afd00a9b88b370c12c364cf450eb61856e

    • SHA512

      56133ee5318ba618cf45bc81537b0d6ebe601f26a23ed8c3fae75fa8d70dca6cd59d61d53f362117317d595b44510d9a33c7db222cbb255dd2f87f603a67d4fc

    • SSDEEP

      24576:fXrqImBCUkwIzhricrHhn20apvnLKUoFx7tzD0:fWISmhh+vLKhx7tH0

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      3e6bf00b3ac976122f982ae2aadb1c51

    • SHA1

      caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

    • SHA256

      4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

    • SHA512

      1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

    • SSDEEP

      192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks