MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e0c4ff1b04d55403948acded8a2a584b869a984d1f846a18f52c6bd67631337. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 4e0c4ff1b04d55403948acded8a2a584b869a984d1f846a18f52c6bd67631337
SHA3-384 hash: f837f7e98982d9353693be6f38e2a62c988ff600fee8e7a23cced1264970221896aa9e547165d36677b8951f45408312
SHA1 hash: e23fbf57a9a807bbc2d482b0992e7d035a798037
MD5 hash: a7d09857db0def83fe5f222ac6292386
humanhash: berlin-hamper-delta-massachusetts
File name:Order Inquiry.exe
Download: download sample
Signature DarkCloud
File size:814'080 bytes
First seen:2023-07-31 13:13:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:Rd6kRQ+A9aUk1qt4VRtht+itFYlcI8DZr//WH:bNQ+AETPtuiglcI8BW
Threatray 402 similar samples on MalwareBazaar
TLSH T1D30523514B98663BDD6E82F4A4BA8326C67CF0DC4603FE68E2C53DE3DB763698104C65
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter James_inthe_box
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
295
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Order Inquiry.exe
Verdict:
Malicious activity
Analysis date:
2023-07-31 13:15:55 UTC
Tags:
darkcloud

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
darkcloud masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkCloud
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Writes or reads registry keys via WMI
Yara detected AntiVM3
Yara detected DarkCloud
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1283187 Sample: Order_Inquiry.exe Startdate: 31/07/2023 Architecture: WINDOWS Score: 100 32 showip.net 2->32 36 Found malware configuration 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Yara detected DarkCloud 2->40 42 6 other signatures 2->42 7 unabusiveness.exe 3 2->7         started        10 Order_Inquiry.exe 3 2->10         started        13 unabusiveness.exe 2 2->13         started        signatures3 process4 file5 44 Multi AV Scanner detection for dropped file 7->44 46 Machine Learning detection for dropped file 7->46 48 Writes or reads registry keys via WMI 7->48 15 unabusiveness.exe 16 7->15         started        17 unabusiveness.exe 7->17         started        30 C:\Users\user\...\Order_Inquiry.exe.log, ASCII 10->30 dropped 50 Injects a PE file into a foreign processes 10->50 19 Order_Inquiry.exe 1 18 10->19         started        23 Order_Inquiry.exe 10->23         started        25 unabusiveness.exe 16 13->25         started        signatures6 process7 dnsIp8 34 showip.net 162.55.60.2, 49700, 49703, 49705 ACPCA United States 19->34 28 C:\Users\user\AppData\...\unabusiveness.exe, PE32 19->28 dropped 52 Tries to harvest and steal browser information (history, passwords, etc) 25->52 file9 signatures10
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-07-29 09:35:24 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud stealer
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
DarkCloud
Unpacked files
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
53f2ad060cf771aa4f197df5789cee95959480c244a0b392bb450c8ce7311d77
MD5 hash:
37e82d3e2864e27b34f5fbacaea759c3
SHA1 hash:
a87024a466e052bff09a170bb8c6f374f6c84c32
SH256 hash:
a7dcf52158bc873fad9f7cc2cdff4eaa98afe26047037120338b8f80f9545f16
MD5 hash:
5a7b1fe7906ae7e36c6d0656860d486e
SHA1 hash:
7c454018846fa3db33ad0ad2a4b8f31ef614b0f6
SH256 hash:
0b21c2aa6d9b8f807ff7171103c0d3311a852223f66c22c0223d2044dfcd8e60
MD5 hash:
d80ad864ea9b71a6f27a19209a17b26a
SHA1 hash:
33b7929963dba2dd3800a6e5ab8c530cb9cbd3ba
SH256 hash:
4e0c4ff1b04d55403948acded8a2a584b869a984d1f846a18f52c6bd67631337
MD5 hash:
a7d09857db0def83fe5f222ac6292386
SHA1 hash:
e23fbf57a9a807bbc2d482b0992e7d035a798037
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments