General

  • Target

    BANK SLIP_TT COPY_2334011636300773456864-2-20-2024_pdf.exe

  • Size

    797KB

  • Sample

    250303-lvjj8svsbx

  • MD5

    516115a3c1a3666298d7645323f18816

  • SHA1

    4517dc6abeae75354b043fe970b81dad5a0b96ea

  • SHA256

    96b4d80d736e56c75348dd2d2369f74e6eaf79fdc2136b56057448352b159aa5

  • SHA512

    3f0e0cbe20f86642e0fa326de2157a146631b3a51b36245047dc9530a64a764c35ad2e9afd5c5547167866c8025f87cd8088171baa8ac35150bb30ba98623097

  • SSDEEP

    24576:fXrqImBCUkwIzh5Xw3QBrlFm4Js5Flbem:fWIScSQBrlFm4y7lbem

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      BANK SLIP_TT COPY_2334011636300773456864-2-20-2024_pdf.exe

    • Size

      797KB

    • MD5

      516115a3c1a3666298d7645323f18816

    • SHA1

      4517dc6abeae75354b043fe970b81dad5a0b96ea

    • SHA256

      96b4d80d736e56c75348dd2d2369f74e6eaf79fdc2136b56057448352b159aa5

    • SHA512

      3f0e0cbe20f86642e0fa326de2157a146631b3a51b36245047dc9530a64a764c35ad2e9afd5c5547167866c8025f87cd8088171baa8ac35150bb30ba98623097

    • SSDEEP

      24576:fXrqImBCUkwIzh5Xw3QBrlFm4Js5Flbem:fWIScSQBrlFm4y7lbem

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      3e6bf00b3ac976122f982ae2aadb1c51

    • SHA1

      caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

    • SHA256

      4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

    • SHA512

      1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

    • SSDEEP

      192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks