MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8fd04789c93f96715ffe402e0f9423e5a6c5b16a79a0a8988444e2f1d326555e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 15


Intelligence 15 IOCs YARA 9 File information Comments

SHA256 hash: 8fd04789c93f96715ffe402e0f9423e5a6c5b16a79a0a8988444e2f1d326555e
SHA3-384 hash: ae39b444b736093b4c82fc415d3d61f0659ffcf7272e9d0ba184f5aff5640c6e4f5fec76a1accf7025d82009c330df13
SHA1 hash: ab78c1bab46888c5c1564f8d2aab27dddc2d899a
MD5 hash: 007fbccd8cd59222e737fd660077a486
humanhash: magnesium-montana-fruit-crazy
File name:RFQ-Order9702.exe
Download: download sample
Signature DarkCloud
File size:2'387'968 bytes
First seen:2025-05-12 08:06:48 UTC
Last seen:2025-05-19 09:13:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ef471c0edf1877cd5a881a6a8bf647b9 (74 x Formbook, 33 x Loki, 29 x Loda)
ssdeep 49152:mUTsamWpS35zGzG13h5hHbO07uEftc0jVIsgySaml:mabpSYSx5xKEWIasma
Threatray 21 similar samples on MalwareBazaar
TLSH T1B9B5339112A98C76E554377248BB5F94CB7C34329F022B728AE1A35FE4732434D93E5E
TrID 33.9% (.EXE) UPX compressed Win32 Executable (27066/9/6)
33.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
13.1% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.6% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter lowmal3
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
419
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ-Order9702.exe
Verdict:
Malicious activity
Analysis date:
2025-05-12 08:36:48 UTC
Tags:
auto-startup

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
infosteal autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a file
Creating a process from a recently created file
Launching a process
Сreating synchronization primitives
Creating a file in the %AppData% directory
Modifying an executable file
Launching a service
Searching for synchronization primitives
Modifying a system executable file
Creating a file in the Windows subdirectories
Using the Windows Management Instrumentation requests
Loading a system driver
Modifying a system file
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Sending an HTTP GET request to an infection source
Sending a custom TCP request
Unauthorized injection to a recently created process
Enabling autorun for a service
Query of malicious DNS domain
Connection attempt to an infection source
Stealing user critical data
Enabling autorun by creating a file
Unauthorized injection to a system process
Infecting executable files
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
autoit compiled-script evasive masquerade microsoft_visual_cc overlay packed packed packed packer_detected upx
Result
Threat name:
AgentTesla, DarkCloud, PureLog Stealer
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Connects to many ports of the same IP (likely port scanning)
Contains functionality to behave differently if execute on a Russian/Kazak computer
Contains functionality to log keystrokes (.Net Source)
Creates files in the system32 config directory
Creates files inside the volume driver (system volume information)
Drops executable to a common third party application directory
Drops VBS files to the startup folder
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Infects executable files (exe, dll, sys, html)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected DarkCloud
Yara detected PureLog Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1687637 Sample: RFQ-Order9702.exe Startdate: 12/05/2025 Architecture: WINDOWS Score: 100 82 api.telegram.org 2->82 84 zlenh.biz 2->84 86 23 other IPs or domains 2->86 88 Suricata IDS alerts for network traffic 2->88 90 Found malware configuration 2->90 92 Malicious sample detected (through community Yara rule) 2->92 96 18 other signatures 2->96 10 RFQ-Order9702.exe 4 2->10         started        14 wscript.exe 2->14         started        16 maintenanceservice.exe 2->16         started        18 19 other processes 2->18 signatures3 94 Uses the Telegram API (likely for C&C communication) 82->94 process4 file5 70 C:\Users\user\AppData\Local\...\murkest.exe, PE32 10->70 dropped 130 Binary is likely a compiled AutoIt script file 10->130 20 murkest.exe 2 10->20         started        132 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->132 24 murkest.exe 14->24         started        26 murkest.exe 16->26         started        28 RegSvcs.exe 16->28         started        134 Creates files inside the volume driver (system volume information) 18->134 136 Creates files in the system32 config directory 18->136 138 Contains functionality to behave differently if execute on a Russian/Kazak computer 18->138 140 Found direct / indirect Syscall (likely to bypass EDR) 18->140 signatures6 process7 file8 64 C:\Users\user\AppData\Roaming\...\murkest.vbs, data 20->64 dropped 114 Binary is likely a compiled AutoIt script file 20->114 116 Drops VBS files to the startup folder 20->116 118 Switches to a custom stack to bypass stack traces 20->118 30 murkest.exe 1 20->30         started        33 RegSvcs.exe 20->33         started        35 murkest.exe 24->35         started        37 RegSvcs.exe 24->37         started        120 Writes to foreign memory regions 26->120 122 Maps a DLL or memory area into another process 26->122 39 RegSvcs.exe 26->39         started        signatures9 process10 signatures11 142 Binary is likely a compiled AutoIt script file 30->142 144 Writes to foreign memory regions 30->144 146 Maps a DLL or memory area into another process 30->146 41 RegSvcs.exe 6 30->41         started        148 Sample uses process hollowing technique 35->148 45 murkest.exe 35->45         started        47 RegSvcs.exe 35->47         started        process12 file13 66 C:\Users\user\AppData\Local\...\svchosts.exe, PE32 41->66 dropped 68 C:\Users\user\AppData\Local\...\gonoblast.exe, PE32 41->68 dropped 124 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 41->124 49 gonoblast.exe 19 41->49         started        54 svchosts.exe 15 2 41->54         started        126 Binary is likely a compiled AutoIt script file 45->126 128 Sample uses process hollowing technique 45->128 signatures14 process15 dnsIp16 72 api.telegram.org 149.154.167.220, 443, 49713, 49733 TELEGRAMRU United Kingdom 49->72 74 parkingpage.namecheap.com 91.195.240.19, 49703, 49704, 80 SEDO-ASDE Germany 49->74 80 9 other IPs or domains 49->80 56 C:\Windows\System32\wbengine.exe, PE32+ 49->56 dropped 58 C:\Windows\System32\wbem\WmiApSrv.exe, PE32+ 49->58 dropped 60 C:\Windows\System32\vds.exe, PE32+ 49->60 dropped 62 138 other malicious files 49->62 dropped 98 Tries to harvest and steal browser information (history, passwords, etc) 49->98 100 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 49->100 102 Drops executable to a common third party application directory 49->102 104 Infects executable files (exe, dll, sys, html) 49->104 76 ip-api.com 208.95.112.1, 49681, 80 TUT-ASUS United States 54->76 78 xma0.com 51.195.65.154, 49683, 49729, 49737 OVHFR France 54->78 106 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 54->106 108 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 54->108 110 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 54->110 112 3 other signatures 54->112 file17 signatures18
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2025-05-09 15:34:53 UTC
File Type:
PE (Exe)
Extracted files:
51
AV detection:
28 of 37 (75.68%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery upx
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
AutoIT Executable
UPX packed file
Drops startup file
Executes dropped EXE
Verdict:
Suspicious
Tags:
expiro external_ip_lookup darkcloud
YARA:
n/a
Unpacked files
SH256 hash:
8fd04789c93f96715ffe402e0f9423e5a6c5b16a79a0a8988444e2f1d326555e
MD5 hash:
007fbccd8cd59222e737fd660077a486
SHA1 hash:
ab78c1bab46888c5c1564f8d2aab27dddc2d899a
SH256 hash:
e98970778601968a452b7bcb8c7cea3153ff6c442bd11ea700a778f0be558623
MD5 hash:
07277e412865c00c199e3d18a0299a40
SHA1 hash:
def0cd51410db50ce3da8b3885b2ab2fd1900dec
Detections:
SUSP_OBF_NET_Reactor_Native_Stub_Jan24 MAL_Malware_Imphash_Mar23_1 MALWARE_Win_RedLine
SH256 hash:
09db2c7c308da5aea0b63a41bc53650571170eed21b77aaa04cf56b27677c81e
MD5 hash:
6dda91973224c59bd4a60e88fae8eb62
SHA1 hash:
2d7ce5daa591e8b2047664b59210aca25f5e0ea1
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
2386f8b71f47befd0dc493b373333a04735749dedc4a12240e47ea5930f85184
MD5 hash:
3edff8f7a6912d8e716903174487b77f
SHA1 hash:
5a5c01a933218192bea3da11b6f5d01601b7723c
Detections:
win_agent_tesla_g2 AgentTesla Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
SH256 hash:
34f6e03d33962f4dbce9d5f0208cc6cd9a9ddef323f253d40e7aa5e270f2fe39
MD5 hash:
33fb3c428ff52bde9bc031edcd8d4d1e
SHA1 hash:
675c0bac98902073c0d069a41208a663d272933a
Detections:
INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_CC_Regex MALWARE_Win_DarkCloud
SH256 hash:
a6ae1372c98ad6c7d8c8afffc0854a2ae7e7c3eea2f5d3c763b14def410c05ac
MD5 hash:
0783cbfefe710c9b26e911e5b91f9243
SHA1 hash:
f5847ed0cc0d49db5aaecfc8afa30121d5eadec9
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24 RedLine_Campaign_June2021
SH256 hash:
75fa461787ee156300612d98db39e31f5f75b1f34de9fba2b2c5061a6da0f9d8
MD5 hash:
19abf0c455e34412743b2a0888cd9af6
SHA1 hash:
535da0b52e858116ca16bbc49dc254980e0fa6a7
Detections:
AutoIT_Compiled
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Generic_Threat_ebf62328
Author:Elastic Security
Rule name:win_m0yv_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.m0yv.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

Executable exe 8fd04789c93f96715ffe402e0f9423e5a6c5b16a79a0a8988444e2f1d326555e

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
MULTIMEDIA_APICan Play MultimediaWINMM.dll::timeGetTime
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AddAce
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetUseConnectionW

Comments