MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0802c13f11828457c8cd914c34d00517fc2ddccfb9060f34d90d01c01db4e47e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 0802c13f11828457c8cd914c34d00517fc2ddccfb9060f34d90d01c01db4e47e
SHA3-384 hash: 5a398b8a1839a749b884f40ed4cdc406f34e32a9814cc1bf87b6857f851d68f105464323531d35fb0a9050b15188d23c
SHA1 hash: 6059f7265731d3d797397804889beb5bfb7a48ff
MD5 hash: cb042c7e4846ae4285bbd1d700bd2c11
humanhash: purple-cup-fish-chicken
File name:DHL invoice.exe
Download: download sample
Signature DarkCloud
File size:1'029'120 bytes
First seen:2023-07-24 06:04:27 UTC
Last seen:2023-07-24 11:24:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:HFuHpEdNi+i4VsKrezc/e7VeySOQOGmM9M:H2CdNiHMVH/eBDy
Threatray 238 similar samples on MalwareBazaar
TLSH T1BA2522A43BAD5E53D26CBDB809A591014BB532592863D3DCCCF634C85EA4BD0BF212E7
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon d455a86d496832b0 (15 x AgentTesla, 10 x Formbook, 8 x Loki)
Reporter abuse_ch
Tags:DarkCloud DHL exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
271
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DHL invoice.exe
Verdict:
Malicious activity
Analysis date:
2023-07-24 06:08:44 UTC
Tags:
darkcloud

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkCloud
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes or reads registry keys via WMI
Yara detected DarkCloud
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Leonem
Status:
Malicious
First seen:
2023-07-24 02:19:56 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
20 of 36 (55.56%)
Threat level:
  5/5
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud stealer
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
DarkCloud
Unpacked files
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
7e8e0052c6275f023fc0198bb86ab6c16456783df81535edc817a36783c3a45b
MD5 hash:
1fbe687a64e5fbfa65d219e181747abf
SHA1 hash:
9a3b984bda952d877e8726991227bb59bb27b469
Detections:
darkcloudstealer_loader
SH256 hash:
3f68cc843eb3b2a764dc02355e2e3f97dce8f1164d6f18a4f77e850410dfc137
MD5 hash:
60126f10641986bbcefca9ed6159994b
SHA1 hash:
df584155d49b10805f1f0d81a758e98b23990815
SH256 hash:
b0650593ee79c50810c861ce8380734ea9de3a1adf77e425cf86b8673ade7b72
MD5 hash:
d68f2f9257c91b202f5d393689199180
SHA1 hash:
c98b52638766aca0e2c82b2416d23f296370660e
SH256 hash:
6ab5caceea5263c0893e40a8596f6cbd05891a019c81f53d9201f15a2cd808ba
MD5 hash:
57614dc88ff50c965cb0a2358ad3a8f4
SHA1 hash:
8661e70e68756d3a77b9ec191e736846ccf2569b
SH256 hash:
0802c13f11828457c8cd914c34d00517fc2ddccfb9060f34d90d01c01db4e47e
MD5 hash:
cb042c7e4846ae4285bbd1d700bd2c11
SHA1 hash:
6059f7265731d3d797397804889beb5bfb7a48ff
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

Executable exe 0802c13f11828457c8cd914c34d00517fc2ddccfb9060f34d90d01c01db4e47e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments