General

  • Target

    Halkbank Ekstre.pdf.exe

  • Size

    1.3MB

  • Sample

    250402-jmqx8stsew

  • MD5

    5e4a8b932d470ecf00cd284e2c5848bd

  • SHA1

    fa0fa4dd24aa8926049ed3d40bf229f3d151bd63

  • SHA256

    8495fddf26cbc9c009f6a93b6a61f5447a8f2d41d574020509c1a72f499140c6

  • SHA512

    29244fd7b26d16cd72fe56e59278272cff61284d3a1b1e0b11dff3bc48d8fd841a7202e691166cfee20f0c7774183de44b77d76bd7b919f557e46d0f3ad00b55

  • SSDEEP

    24576:gu6J33O0c+JY5UZ+XC0kGso6FaVSB6wWDe9xD706TIBOWY:Ku0c++OCvkGs9FaVSBg+xD706TyY

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      Halkbank Ekstre.pdf.exe

    • Size

      1.3MB

    • MD5

      5e4a8b932d470ecf00cd284e2c5848bd

    • SHA1

      fa0fa4dd24aa8926049ed3d40bf229f3d151bd63

    • SHA256

      8495fddf26cbc9c009f6a93b6a61f5447a8f2d41d574020509c1a72f499140c6

    • SHA512

      29244fd7b26d16cd72fe56e59278272cff61284d3a1b1e0b11dff3bc48d8fd841a7202e691166cfee20f0c7774183de44b77d76bd7b919f557e46d0f3ad00b55

    • SSDEEP

      24576:gu6J33O0c+JY5UZ+XC0kGso6FaVSB6wWDe9xD706TIBOWY:Ku0c++OCvkGs9FaVSBg+xD706TyY

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Drops startup file

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks