MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 52d3c96b710026a47745d1f5d8001e0d3c57eff2c8067466af44a36bacd0eea4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 52d3c96b710026a47745d1f5d8001e0d3c57eff2c8067466af44a36bacd0eea4
SHA3-384 hash: fce7135bd8774acaa1620420779de7f7c075a1c5e3ae66f969808dbb7a82158a0eaa2904133135d8915e0bd757772c36
SHA1 hash: 71be52f22312c5f0de562aedfd0b44b9dfbb5205
MD5 hash: 49b2d9106f6e5a03b5347b9876944c2f
humanhash: spaghetti-texas-oxygen-beryllium
File name:IMG023544404_SCAN_COPY.exe
Download: download sample
Signature DarkCloud
File size:901'632 bytes
First seen:2023-04-18 11:37:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 24576:wJ1RM1RhYN/nC6ZRyaNDJAe7zELOduoCcFL6gcPNX:wJ1REPYN/n3yEV3X0O8odL6n
Threatray 236 similar samples on MalwareBazaar
TLSH T1A1150128D139ADF2E6AD0B7600003AD9CB71A1E37477C73C0F9679C69BAEB152D94187
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
220
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
IMG023544404_SCAN_COPY.exe
Verdict:
Suspicious activity
Analysis date:
2023-04-18 11:44:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkCloud
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Tries to harvest and steal browser information (history, passwords, etc)
Writes or reads registry keys via WMI
Yara detected DarkCloud
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud stealer
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
DarkCloud
Malware Config
C2 Extraction:
https://api.telegram.org/bot6220925905:AAFbd3Et4YQi4C1WTvNkPbMsAOdz5c8giT0/sendMessage?chat_id=5463149861
Unpacked files
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
1f89fe7d34ea6d888ac1208ca0867730560e93cd63cedc81f12c478e1a7c22e0
MD5 hash:
05d38f04af5f3b3d9fcbaf16b58a8473
SHA1 hash:
505ea871d4a4eec5968586707f6fc302ecd32bb6
SH256 hash:
c811ca3f4e51437ff947fd5dedd6e8b48f87642a9e1eeb6724aeeb2ac135f716
MD5 hash:
46aac202a467d394d356b93b2feb83a8
SHA1 hash:
cd914367d5c41ec23570058bb35097b2fed6c716
SH256 hash:
0fd1f00d94aff36ad8f02077efb33ddf269985ea37038aae554ff6202fdc020f
MD5 hash:
8dfd8e44c82066f4aeeff652fa2a33c5
SHA1 hash:
b844952e48ecab0e7ab2e3d5e38a20629399f94c
SH256 hash:
c8808b69b0f4d52c253e35b001da94086786b34162fd51daa3f17eda94bac7f0
MD5 hash:
da56041df789c24cb2a36a364431f766
SHA1 hash:
876e6c579d1092a76ce90c500c43af0cf11724a4
SH256 hash:
d2c49ced6f820a26f5597281a39f052faba4166f5ccec9c0aa2894bfd1a2ee32
MD5 hash:
81bac9ac8383ec2bd847045143e7a801
SHA1 hash:
79cd5eb8594f49adefb56a627bea69022d78ac79
SH256 hash:
52d3c96b710026a47745d1f5d8001e0d3c57eff2c8067466af44a36bacd0eea4
MD5 hash:
49b2d9106f6e5a03b5347b9876944c2f
SHA1 hash:
71be52f22312c5f0de562aedfd0b44b9dfbb5205
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

Executable exe 52d3c96b710026a47745d1f5d8001e0d3c57eff2c8067466af44a36bacd0eea4

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments