MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ec0d72589beb5612e587061560e3b55a728b71642f60b1d4ae095bcdaab57fc8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 16


Intelligence 16 IOCs YARA 8 File information Comments

SHA256 hash: ec0d72589beb5612e587061560e3b55a728b71642f60b1d4ae095bcdaab57fc8
SHA3-384 hash: 42124344f2ea48afbb7bae3271c454b9c45ba3a0b3726454b7ddc09e11100d35ba0a4da14d1dc6bf452d84551720efdd
SHA1 hash: 7eb443ea956a5de3159dd38206460809345d1436
MD5 hash: 82a8f6b951126abaa0e884cb6e5a9b19
humanhash: zulu-butter-single-network
File name:z10RFQ-202401.exe
Download: download sample
Signature DarkCloud
File size:1'045'512 bytes
First seen:2024-10-09 07:00:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'737 x AgentTesla, 19'596 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:JoaKAfTxOCPSKRxHkB6a6Fbdh9WWUO4dJ7EE:JoaKyTxrvxHTaebbsoE
Threatray 160 similar samples on MalwareBazaar
TLSH T1A325D01466548F62CA74C7F53872E17053FC6EAE642EF2551EC16EEBBAA1F004960F83
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter FXOLabs
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
395
Origin country :
BR BR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
z10RFQ-202401.exe
Verdict:
Malicious activity
Analysis date:
2024-10-09 07:33:05 UTC
Tags:
upx darkcloud

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Powershell Exploit Micro Msil
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
invalid-signature overlay packed signed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkCloud
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected DarkCloud
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1529663 Sample: z10RFQ-202401.exe Startdate: 09/10/2024 Architecture: WINDOWS Score: 100 52 api.telegram.org 2->52 54 showip.net 2->54 60 Suricata IDS alerts for network traffic 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 68 10 other signatures 2->68 8 heVzRpkLR.exe 5 2->8         started        11 z10RFQ-202401.exe 7 2->11         started        14 helicinidae.exe 2->14         started        16 helicinidae.exe 2->16         started        signatures3 66 Uses the Telegram API (likely for C&C communication) 52->66 process4 file5 76 Multi AV Scanner detection for dropped file 8->76 78 Machine Learning detection for dropped file 8->78 80 Writes to foreign memory regions 8->80 86 2 other signatures 8->86 18 RegSvcs.exe 8->18         started        22 schtasks.exe 8->22         started        24 RegSvcs.exe 8->24         started        44 C:\Users\user\AppData\Roaming\heVzRpkLR.exe, PE32 11->44 dropped 46 C:\Users\...\heVzRpkLR.exe:Zone.Identifier, ASCII 11->46 dropped 48 C:\Users\user\AppData\Local\Temp\tmpD2.tmp, XML 11->48 dropped 50 C:\Users\user\...\z10RFQ-202401.exe.log, ASCII 11->50 dropped 82 Uses schtasks.exe or at.exe to add and modify task schedules 11->82 84 Adds a directory exclusion to Windows Defender 11->84 26 RegSvcs.exe 61 11->26         started        28 powershell.exe 23 11->28         started        30 schtasks.exe 1 11->30         started        32 conhost.exe 14->32         started        34 conhost.exe 16->34         started        signatures6 process7 dnsIp8 56 api.telegram.org 149.154.167.220, 443, 49773, 49774 TELEGRAMRU United Kingdom 18->56 70 Tries to harvest and steal browser information (history, passwords, etc) 18->70 72 Tries to steal Crypto Currency Wallets 18->72 36 WmiPrvSE.exe 18->36         started        38 conhost.exe 22->38         started        58 showip.net 162.55.60.2, 49724, 49730, 80 ACPCA United States 26->58 74 Loading BitLocker PowerShell Module 28->74 40 conhost.exe 28->40         started        42 conhost.exe 30->42         started        signatures9 process10
Threat name:
Win32.Trojan.Znyonm
Status:
Malicious
First seen:
2024-10-09 07:01:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
29
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud discovery execution stealer
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
DarkCloud
Malware Config
C2 Extraction:
https://api.telegram.org/bot5723230539:AAHXr6rmQsEsq1CdwKBxLF-mnANEsBE4mYk
Unpacked files
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
42c6f8c8ded60f1f4ea5eff8fa73830193bcd1bbe739d2402c2eba8253dcd024
MD5 hash:
22b334f2b7433f7e4bd128671ad5347a
SHA1 hash:
abeb539d0ad904d10389a30ee7d1c1ec29608be5
Detections:
darkcloudstealer INDICATOR_SUSPICIOUS_EXE_TelegramChatBot MALWARE_Win_DarkCloud INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
SH256 hash:
8190d06039b645b2fda0550719277dd0f229c5cbf0c7dcb0fa5bfd9dd7c2c332
MD5 hash:
a09adf9c64db8f893b28f96b5557bb66
SHA1 hash:
7f2e03eb69f3f12578395cba72e9bcc36d130e15
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
682c261fcd08c676ef231f46eac1c054c8df17522846b9e4adbafb62e8482dab
MD5 hash:
5a6cead6de3340dd9e0b16d599e5d1f5
SHA1 hash:
00e25f93284ff0d2493c6df3a596891d0848399e
SH256 hash:
ec0d72589beb5612e587061560e3b55a728b71642f60b1d4ae095bcdaab57fc8
MD5 hash:
82a8f6b951126abaa0e884cb6e5a9b19
SHA1 hash:
7eb443ea956a5de3159dd38206460809345d1436
Detections:
INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

Executable exe ec0d72589beb5612e587061560e3b55a728b71642f60b1d4ae095bcdaab57fc8

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments