General
-
Target
4_REF-REFERENCE-ORDER-QUOTATION-DETAILS.rar
-
Size
1.4MB
-
Sample
250303-l2qbcsvvev
-
MD5
21733aa9c7f074166214aed407267ee2
-
SHA1
e7155c20910a18ac86ffd6b068ffac08f5bb7667
-
SHA256
6a3a296b6bc17c71c15089e59a07de7a564b694d1f841b382f3ec8b15bcff29d
-
SHA512
ccc5a7c5bd3b586fff81f7cc34f799fd0e3b5474bf5d7fa408d689455e5a805cb03cc86c3fa6f401519d852b184403341da46aab1cc95fec56e0114f98c51a81
-
SSDEEP
24576:TZib+ZmlFJZQdJwop15/faixgG9LRq0AlLppLa9Oph57ZuH2iBlHFkStTU:cbkwJSdqon5/faQgGZRs29Odty2iBlHy
Static task
static1
Behavioral task
behavioral1
Sample
REF-REFERENCE-ORDER-QUOTATION-DETAILS.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
REF-REFERENCE-ORDER-QUOTATION-DETAILS.cmd
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcloud
Protocol: ftp- Host:
@StrFtpServer - Port:
21 - Username:
@StrFtpUser - Password:
@StrFtpPass
Targets
-
-
Target
REF-REFERENCE-ORDER-QUOTATION-DETAILS.cmd
-
Size
5.0MB
-
MD5
61acf73d931438d77e85e31f3b5d8e6a
-
SHA1
2abe35f912290a8d4ddaa4485266e9d441d7eb13
-
SHA256
7b8008ab3703f5e1bfaf4d2970c133068fbdba704c311819e282c4456866afdc
-
SHA512
1efb0f8ec52b3ee0a3902ce89d70de6bcc117493f2a46265f8d1b1b7e50542b0f39b7a15e3f40a562cd98c591ac328c44504dee8f8f05186f750e26a3832f637
-
SSDEEP
49152:sZZC85MQCbNigm89TxcS/OCjapGp2eq2PDdpGuC3JClhJphPv/84LuSNtGaSy6Qm:C
-
Darkcloud family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2