MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 daa415845370a3b59dd929320bad24150758a2c50108ee2b6d2bdd047fa05c08. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DarkCloud
Vendor detections: 15
| SHA256 hash: | daa415845370a3b59dd929320bad24150758a2c50108ee2b6d2bdd047fa05c08 |
|---|---|
| SHA3-384 hash: | 228472dd5e8f1f5a309351dab5782a22eaef275bea6616db5022a72397fc8fd8fb11a935819990d00084adfdeab475bf |
| SHA1 hash: | d9f8246d824213e9368ca2a38f54bdf6e194a550 |
| MD5 hash: | 63b58d16a397fdf000a9aa7c5e4ee26d |
| humanhash: | ten-six-white-berlin |
| File name: | daa415845370a3b59dd929320bad24150758a2c50108ee2b6d2bdd047fa05c08 |
| Download: | download sample |
| Signature | DarkCloud |
| File size: | 521'728 bytes |
| First seen: | 2025-01-10 14:53:28 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:e3C07aRUEbG0XvCcoJv62Vk7cxGVAiuxnBPQxErJ4M:yna6ES0XvCDvJVkYx7lxn9kErW |
| TLSH | T1FBB42369FBE21603D9C256F9ACD5747406F14010A65BDF2BFC72235CAD852EE0708ABB |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10522/11/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | DarkCloud exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
773e56d43a64f8dc2f504591a154b045827841c9c352fcb0eb5e00ffb7d2494d
a4e306de360dd28b8d54760139d3b4b9fe5448d6c906ea3ff3bc54b3ab97ea27
a7c07d958dc83b5b3f0f0d5675b93eeced5edaaae7079b218c52a393e2a1b102
e23a32c4d68cbf04b1206bd1459678a749482d44ef5ed825e507d124d34f8bc9
daa415845370a3b59dd929320bad24150758a2c50108ee2b6d2bdd047fa05c08
23b7eb252bc2a67247c1a93f3f810acb46664d21fbb029051297c016e2991bcc
a755d8812c9d8a5b24b65ed8d6eb622fddb6474ce76e3139d28663f54d15a0ac
595f1fec6cdafaf5f0895d32303a6647b792cbdc3f6467c490c75683576df1ea
79f7e76ba3a8780a2dd46d78aac07f2235f457ee2771ef4556b85c12f2be0061
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | golang_david_CSC846 |
|---|---|
| Author: | David |
| Description: | CSC-846 Golang |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing SQL queries to confidential data stores. Observed in infostealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_DarkCloud |
|---|---|
| Author: | ditekSHen |
| Description: | Detects DarkCloud infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | ProtectSharewareV11eCompservCMS |
|---|---|
| Author: | malware-lu |
| Rule name: | RansomPyShield_Antiransomware |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP) |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vba |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | Windows_Trojan_DarkCloud_9905abce |
|---|---|
| Author: | Elastic Security |
| Rule name: | XWorm_3_0_3_1_Detection |
|---|---|
| Author: | Archevod |
| Description: | Detects XWorm versions 3.0 and 3.1 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.