General

  • Target

    April New Order.js

  • Size

    2KB

  • Sample

    250403-jt6x2asxcz

  • MD5

    07151504178ba40a7d393a217ca6e169

  • SHA1

    592662fe8699669abbed3e29d4b9f784ae22a0c9

  • SHA256

    6b8a4c3d4a4a0a3aea50037744c5fec26a38d3fb6a596d006457f1c51bbc75c7

  • SHA512

    99ac2e98d003321fd6f20de14fe6c0fc16a5f716d257b6266e1b6b3ffd7ebf5eaac6234509ea694b1ed5094cc720e852fd37806331cac7922f25427c8c16ded1

Malware Config

Extracted

Family

darkcloud

C2

https://api.telegram.org/bot7684022823:AAFw0jHSu-b4qs6N7yC88nUOR8ovPrCdIrs/sendMessage?chat_id=6542615755

Targets

    • Target

      April New Order.js

    • Size

      2KB

    • MD5

      07151504178ba40a7d393a217ca6e169

    • SHA1

      592662fe8699669abbed3e29d4b9f784ae22a0c9

    • SHA256

      6b8a4c3d4a4a0a3aea50037744c5fec26a38d3fb6a596d006457f1c51bbc75c7

    • SHA512

      99ac2e98d003321fd6f20de14fe6c0fc16a5f716d257b6266e1b6b3ffd7ebf5eaac6234509ea694b1ed5094cc720e852fd37806331cac7922f25427c8c16ded1

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.