General
-
Target
purchase list #8479734734-8843947347_____________________________.vbe
-
Size
11KB
-
Sample
250303-zf13maytft
-
MD5
9884baf8abdb370f9a9e9cfc6473fa02
-
SHA1
100a91e29963dacabfffe6f786f666b494460e4b
-
SHA256
e47b77bf56b3fcc37782efc25ebafaac3af6ace16521943dfbee00266b2ce378
-
SHA512
0df20a9ba3df27ab258494e1c49fa42c910a7ccb89845f41783710b49b122248c3ba833ce5e9b251fd908e93d4df49de13f10d0f134ab9e92916bd7a7e72a5dc
-
SSDEEP
192:gh1qAIWI4stbVUwsmxvoTsOGXB1krs1hNRdG1K:Ft7tbzxvoT3GXB1krs1hNRdGc
Static task
static1
Behavioral task
behavioral1
Sample
purchase list #8479734734-8843947347_____________________________.vbe
Resource
win7-20240903-en
Malware Config
Extracted
darkcloud
- email_from
- email_to
Targets
-
-
Target
purchase list #8479734734-8843947347_____________________________.vbe
-
Size
11KB
-
MD5
9884baf8abdb370f9a9e9cfc6473fa02
-
SHA1
100a91e29963dacabfffe6f786f666b494460e4b
-
SHA256
e47b77bf56b3fcc37782efc25ebafaac3af6ace16521943dfbee00266b2ce378
-
SHA512
0df20a9ba3df27ab258494e1c49fa42c910a7ccb89845f41783710b49b122248c3ba833ce5e9b251fd908e93d4df49de13f10d0f134ab9e92916bd7a7e72a5dc
-
SSDEEP
192:gh1qAIWI4stbVUwsmxvoTsOGXB1krs1hNRdG1K:Ft7tbzxvoT3GXB1krs1hNRdGc
-
Darkcloud family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-