MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4fc50d17362e6ed4e53b082e4d01ad286eb2caca5113ae09e48eca48889b36fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 4fc50d17362e6ed4e53b082e4d01ad286eb2caca5113ae09e48eca48889b36fb
SHA3-384 hash: 340a140933c6c4d98c809a7e9e904bd2db33f398c4533a1459512069df56d32596bc60ad144e8d77327f8f6e116297ba
SHA1 hash: 11c93e550822f2e4e8ca5366e1f2d270d4785ea7
MD5 hash: 525b29804499f54683326bd36d358a40
humanhash: delta-delaware-echo-early
File name:Purchase Order Specifications for March-2023 update.pdf (253K).exe
Download: download sample
Signature DarkCloud
File size:1'256'960 bytes
First seen:2023-03-30 16:59:42 UTC
Last seen:2023-04-05 21:00:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'747 x AgentTesla, 19'638 x Formbook, 12'244 x SnakeKeylogger)
ssdeep 24576:ZmsNORPPda72PV1sjlty/+gpd9O2hyyL7imXSQ:ZmnRPhD3bf9O2h9T
Threatray 48 similar samples on MalwareBazaar
TLSH T19945E1C0E1886598EC1A5B3940B9D8309337BEADA975D51D6ED9FC637BB32C32026C17
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 0e39356644063349 (11 x AgentTesla, 3 x Formbook, 3 x SnakeKeylogger)
Reporter cocaman
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
275
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Purchase Order Specifications for March-2023 update.pdf (253K).exe
Verdict:
Suspicious activity
Analysis date:
2023-03-30 17:02:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Unauthorized injection to a recently created process
Creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Writes or reads registry keys via WMI
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Nekark
Status:
Malicious
First seen:
2023-03-30 11:35:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
16 of 35 (45.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Unpacked files
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
5062f99a5460cbd448d7f9c35d5c05aafa3ce36357be73268367d779dd92396e
MD5 hash:
c499b0e057f46db9f5ad9f0e9181830e
SHA1 hash:
fda2b448e6c7a411e1baed2a8bca7050b9b769ef
SH256 hash:
432baed298b11be97af29f964a929f865bd6af77c4f66921ae328cd6eef37a2b
MD5 hash:
441307c41a8b0f5f67d2c4093d4d80d4
SHA1 hash:
fd4d672179fed9ef8aad623f3fa34d5487f0593b
SH256 hash:
80c96655802bfd4c4d96015eb35263b478af816098713d4d66326c9c143746bc
MD5 hash:
198b24943de10a7f18af4e641bc430e7
SHA1 hash:
d2bf7a7e35168dc0faa6bb3adddee47d59157e92
SH256 hash:
5583716e59855df1555582ca188993b0ca96d7fc65585ba07898cfefc2aa5b3e
MD5 hash:
054732552aa5da3402aea2e9f774af4e
SHA1 hash:
97342c3d97520879e12223920f26924d010133d1
SH256 hash:
3c507afadbb1c31a9ebdd24baac5739d47576159e01c5e84f973c951885100aa
MD5 hash:
e79bf0e7e9d52d398e0b23b352394c68
SHA1 hash:
682325763a0ec77e0fd475ea3a4021b4651eceac
SH256 hash:
4fc50d17362e6ed4e53b082e4d01ad286eb2caca5113ae09e48eca48889b36fb
MD5 hash:
525b29804499f54683326bd36d358a40
SHA1 hash:
11c93e550822f2e4e8ca5366e1f2d270d4785ea7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

Executable exe 4fc50d17362e6ed4e53b082e4d01ad286eb2caca5113ae09e48eca48889b36fb

(this sample)

Comments