General

  • Target

    purchase list #8479734734-8843947347_____________________________.vbe

  • Size

    11KB

  • Sample

    250303-zf13maytft

  • MD5

    9884baf8abdb370f9a9e9cfc6473fa02

  • SHA1

    100a91e29963dacabfffe6f786f666b494460e4b

  • SHA256

    e47b77bf56b3fcc37782efc25ebafaac3af6ace16521943dfbee00266b2ce378

  • SHA512

    0df20a9ba3df27ab258494e1c49fa42c910a7ccb89845f41783710b49b122248c3ba833ce5e9b251fd908e93d4df49de13f10d0f134ab9e92916bd7a7e72a5dc

  • SSDEEP

    192:gh1qAIWI4stbVUwsmxvoTsOGXB1krs1hNRdG1K:Ft7tbzxvoT3GXB1krs1hNRdGc

Malware Config

Extracted

Family

darkcloud

Attributes

Targets

    • Target

      purchase list #8479734734-8843947347_____________________________.vbe

    • Size

      11KB

    • MD5

      9884baf8abdb370f9a9e9cfc6473fa02

    • SHA1

      100a91e29963dacabfffe6f786f666b494460e4b

    • SHA256

      e47b77bf56b3fcc37782efc25ebafaac3af6ace16521943dfbee00266b2ce378

    • SHA512

      0df20a9ba3df27ab258494e1c49fa42c910a7ccb89845f41783710b49b122248c3ba833ce5e9b251fd908e93d4df49de13f10d0f134ab9e92916bd7a7e72a5dc

    • SSDEEP

      192:gh1qAIWI4stbVUwsmxvoTsOGXB1krs1hNRdG1K:Ft7tbzxvoT3GXB1krs1hNRdGc

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks