MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5778f12341d4f9b19e85cdaaa52eb0b04d5370fe6a1ef11c03133ac6b2df5810. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: 5778f12341d4f9b19e85cdaaa52eb0b04d5370fe6a1ef11c03133ac6b2df5810
SHA3-384 hash: 20c859965521913725d96c2e0a2eea8fa643c63d54693e3277ce70be9f4b43442b93315f11eb7ed9908e5a2ba578963b
SHA1 hash: 6860268cfcbe0cdabbf2653921ea162c5054fb21
MD5 hash: f7824f67d9af08106ca9f6f02b3328df
humanhash: cardinal-winter-arkansas-sixteen
File name:PRE ALERT NOTICE.zip
Download: download sample
Signature DarkCloud
File size:417'262 bytes
First seen:2023-07-17 15:55:26 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:SPLMNUQ87sl3V8pq001uKc+Q5wco/fGQU5:STSL73001uuQUfGQs
TLSH T1BA94239F7D296486D8FA24AC41B8ABB580C45C3DF9199F08AD39F1DB94624CF007C67B
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:DarkCloud zip


Avatar
cocaman
Malicious email (T1566.001)
From: "obd2.szx<obd2.szx@mclhk.net>" (likely spoofed)
Received: "from [45.12.253.71] (unknown [45.12.253.71]) "
Date: "17 Jul 2023 17:49:24 +0200"
Subject: "RE: pre-alert : FCL/FOB 1*40HQ MCL23050280 NANSHA TO ABU DHABI A/GAC(ABU DHABI) KDK MAY RATES"
Attachment: "PRE ALERT NOTICE.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:PRE ALERT NOTICE.exe
File size:432'023 bytes
SHA256 hash: 43b0616d8f71811739454e94f8a91e47dfd51e0d30a38c7a90f78feb6b177556
MD5 hash: b50c9a7ff94d8d2865299b84f1712890
MIME type:application/x-dosexec
Signature DarkCloud
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control darkcloud lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2023-07-17 15:25:38 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
22 of 37 (59.46%)
Threat level:
  5/5
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud stealer
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
DarkCloud
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

zip 5778f12341d4f9b19e85cdaaa52eb0b04d5370fe6a1ef11c03133ac6b2df5810

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments