MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e87e911023dccdfb70aa989b5916c0d6f18eb7203fc2704df3aad1173821e0a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: e87e911023dccdfb70aa989b5916c0d6f18eb7203fc2704df3aad1173821e0a5
SHA3-384 hash: 4cbfa5409aa82993e6037758991c4336f2f37a2b5455108fd924b5ab8024fe5e1dc7adc3c5ce510e01fcc609bd0d83c3
SHA1 hash: 7d761df50d6b1ddfd59331c0a002d9b024ad7c10
MD5 hash: 930d6338432849c5d30cd44090db1aa3
humanhash: thirteen-magnesium-cola-seventeen
File name:Quote 1345 rev.3.exe
Download: download sample
Signature DarkCloud
File size:1'571'328 bytes
First seen:2023-05-03 10:30:49 UTC
Last seen:2023-05-03 11:41:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:U8QXms8xM4aaK9mU/5e+YLBzTzxBp0daGBxH7OkaNDMwyj1Ir+VL97WFfu622jtT:UfmcBaKZ/4RLLBalBxbJsDyhIr88J12Q
Threatray 20 similar samples on MalwareBazaar
TLSH T1C8751251316A5B6AD03AA7F0106CF84103B0B1E775EFD9382EE378CA8A97F011A7595F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter Anonymous
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
276
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Quote 1345 rev.3.exe
Verdict:
Malicious activity
Analysis date:
2023-05-03 10:33:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkCloud
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates files in the system32 config directory
Creates files inside the volume driver (system volume information)
Drops executable to a common third party application directory
Found malware configuration
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries random domain names (often used to prevent blacklisting and sinkholes)
Snort IDS alert for network traffic
Tries to download HTTP data from a sinkholed server
Tries to harvest and steal browser information (history, passwords, etc)
Writes or reads registry keys via WMI
Yara detected DarkCloud
Yara detected Generic Dropper
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 858200 Sample: Quote_1345_rev.3.exe Startdate: 03/05/2023 Architecture: WINDOWS Score: 100 46 Tries to download HTTP data from a sinkholed server 2->46 48 Snort IDS alert for network traffic 2->48 50 Multi AV Scanner detection for domain / URL 2->50 52 11 other signatures 2->52 6 Quote_1345_rev.3.exe 3 2->6         started        10 TieringEngineService.exe 2->10         started        12 armsvc.exe 1 2->12         started        15 17 other processes 2->15 process3 dnsIp4 32 C:\Users\user\...\Quote_1345_rev.3.exe.log, ASCII 6->32 dropped 62 Writes or reads registry keys via WMI 6->62 64 Injects a PE file into a foreign processes 6->64 17 Quote_1345_rev.3.exe 4 6->17         started        66 Creates files inside the volume driver (system volume information) 10->66 22 WerFault.exe 10->22         started        40 oshhkdluh.biz 12->40 42 yhqqc.biz 107.6.74.76, 49759, 49771, 49777 VOXEL-DOT-NETUS United States 12->42 44 52 other IPs or domains 12->44 file5 signatures6 process7 dnsIp8 34 oshhkdluh.biz 17->34 36 dwrqljrr.biz 173.231.184.122, 49692, 49695, 49744 VOXEL-DOT-NETUS United States 17->36 38 33 other IPs or domains 17->38 24 C:\Windows\System32\xbgmsvc.exe, PE32+ 17->24 dropped 26 C:\Windows\System32\wbengine.exe, PE32+ 17->26 dropped 28 C:\Windows\System32\wbem\WmiApSrv.exe, PE32+ 17->28 dropped 30 75 other malicious files 17->30 dropped 54 Tries to harvest and steal browser information (history, passwords, etc) 17->54 56 Drops executable to a common third party application directory 17->56 58 Infects executable files (exe, dll, sys, html) 17->58 60 Creates files in the system32 config directory 22->60 file9 signatures10
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-05-02 15:29:04 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
21 of 35 (60.00%)
Threat level:
  5/5
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Executes dropped EXE
Reads user/profile data of web browsers
DarkCloud
Malware Config
C2 Extraction:
https://api.telegram.org/bot5955632087:AAGbHX-YygFpBeOiEaTfH9CY-2MMNrZcY48/sendMessage?chat_id=865011046
Unpacked files
SH256 hash:
feab31ee81c680618e0270311a56dd14e6f70a11886dd1924c43201fbcbf4689
MD5 hash:
0027335f9c089d54dc3d50a53f1d2266
SHA1 hash:
d110381c5a825c49c1f4896e6930e5e4ed0ffcec
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
e38b022d184ca6502803ddeed553f59b246f3290ac0f2deda429305d5811c558
MD5 hash:
1a3b38738f08dbbec03beba0e5607b26
SHA1 hash:
b957c8de1268e4c8faa30923cf77b62a4adc7b26
SH256 hash:
e028d4ca007d7b3cef96f7554ff58d281259d93a37778c33079c8a1ea0545c7d
MD5 hash:
d53e6d12394846c52c97aed7518df29d
SHA1 hash:
97b21b124bb701bfd9371153a78cffc97f26d6ad
SH256 hash:
40c050c20d957d26b932faf690f9c2933a194aa6607220103ec798f46ac03403
MD5 hash:
c768bac25fc6f0551a11310e7caba8d5
SHA1 hash:
95f9195e959fb48277c95d1dd1c97a4edff7cb3a
SH256 hash:
51e9b813382cd853599dab2833b2f70a358b5f2a72e91a8b5395ad6c45b63135
MD5 hash:
e7fb72dcd0dd9b9aa2421168f6278f91
SHA1 hash:
30c95a8ea72ecfbd6be438659474074e6934912c
SH256 hash:
8362a107d309eb065d84b5780573c9fd37827ff8f975eaa758b6cec1091172fc
MD5 hash:
c23099f8f63823b69870bfbf7749ecef
SHA1 hash:
2651b69408237d6854e68fc610ea8bb12acae4fd
SH256 hash:
e87e911023dccdfb70aa989b5916c0d6f18eb7203fc2704df3aad1173821e0a5
MD5 hash:
930d6338432849c5d30cd44090db1aa3
SHA1 hash:
7d761df50d6b1ddfd59331c0a002d9b024ad7c10
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

Executable exe e87e911023dccdfb70aa989b5916c0d6f18eb7203fc2704df3aad1173821e0a5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments