General

  • Target

    04032025_0158_Sales Contract TQR-379479250986497-2025_pdf.txz

  • Size

    892KB

  • Sample

    250304-cdvfqswny2

  • MD5

    ce446a21255a896629025689483f0745

  • SHA1

    7d70189ba08ce8fca720a882d4d8a0f9489f9a9e

  • SHA256

    d9184f69e0f7b2c1d16d10db1249b6c2eb0a2f6d43d25b7d404918886048e19a

  • SHA512

    3367df9afad5950772198b527b8e735586177821fa90525be6a8a7a1ce4eef5870d3f1b4d820dee8647f708c49133f07d7b799790b91a628c36d601c45f6a554

  • SSDEEP

    24576:3R375r/PUxEW26IhlQmZx2Q8M7RAy5aEo+Qh:3p578w6IhF2jamyo+Qh

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      Sales Contract TQR-379479250986497-2025_pdf.exe

    • Size

      988KB

    • MD5

      5ede8d1d4284eb332ccd20188b48207d

    • SHA1

      78c76150c0eaeb08ae5578cdb0f91830d88ce965

    • SHA256

      990cef1d7ac4e353395869661920a5d3f7a652fcc2cb2f439ed08b1503627aee

    • SHA512

      ceb574e05accd491921ee7433073d6ed52a0bc9d3e97aaae97cdb8137eb78ffa8032f059b66beda31e7e57e1254f9ef7f2a243cecba7124063917f3346edcdb9

    • SSDEEP

      24576:/XyXoL3JzSdTTuORm1af+Codlk9q5Wfwg:vWoDJ+dFRm1a9giq5gwg

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      3e6bf00b3ac976122f982ae2aadb1c51

    • SHA1

      caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

    • SHA256

      4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

    • SHA512

      1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

    • SSDEEP

      192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks