MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fb71b9df885463cb148e10ddad2b81ca883ce2dcc0a7739808a3e5d203f9d00b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: fb71b9df885463cb148e10ddad2b81ca883ce2dcc0a7739808a3e5d203f9d00b
SHA3-384 hash: 9f5bbfc6a674eeff89f459c2304116db374d64e3c04281b9ce2c2ed3c24566d3bce152b66b97af2f412df9d5058334d2
SHA1 hash: a7cf42f11071fe319b4e73203ca8269fb38f008c
MD5 hash: d6d89eff8ae95f17795daf44ddc35389
humanhash: neptune-nevada-apart-rugby
File name:Quote 1345 rev.3.exe
Download: download sample
Signature DarkCloud
File size:1'479'168 bytes
First seen:2023-05-02 17:19:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 24576:4AETCN6fdDv7X8E7Rf/vj6ksjurjtBEmDUheyX7TFqktKOpnAxWB:Yw61XNxmkQismIhXNtZpAc
Threatray 19 similar samples on MalwareBazaar
TLSH T1716512066064DB5BFE7687F09564FF8463F0B4B794E4E6282EA920C2DDB2F141E4C91B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter Anonymous
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
285
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Quote 1345 rev.3.exe
Verdict:
Malicious activity
Analysis date:
2023-05-02 17:19:43 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Creating a file in the %AppData% directory
Modifying an executable file
Launching a service
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Modifying a system executable file
Launching a process
Loading a system driver
Enabling autorun for a service
Query of malicious DNS domain
Infecting executable files
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkCloud
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates files inside the volume driver (system volume information)
Drops executable to a common third party application directory
Found malware configuration
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries random domain names (often used to prevent blacklisting and sinkholes)
Snort IDS alert for network traffic
Tries to download HTTP data from a sinkholed server
Tries to harvest and steal browser information (history, passwords, etc)
Writes or reads registry keys via WMI
Yara detected DarkCloud
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 857836 Sample: Quote_1345_rev.3.exe Startdate: 02/05/2023 Architecture: WINDOWS Score: 100 33 typgfhb.biz 2->33 47 Tries to download HTTP data from a sinkholed server 2->47 49 Snort IDS alert for network traffic 2->49 51 Multi AV Scanner detection for domain / URL 2->51 53 10 other signatures 2->53 7 Quote_1345_rev.3.exe 3 2->7         started        11 TieringEngineService.exe 2->11         started        13 armsvc.exe 1 2->13         started        16 16 other processes 2->16 signatures3 process4 dnsIp5 31 C:\Users\user\...\Quote_1345_rev.3.exe.log, ASCII 7->31 dropped 61 Writes or reads registry keys via WMI 7->61 18 Quote_1345_rev.3.exe 4 7->18         started        63 Creates files inside the volume driver (system volume information) 11->63 41 vrrazpdh.biz 107.6.74.76, 49754, 49756, 49774 VOXEL-DOT-NETUS United States 13->41 43 vyome.biz 162.217.98.146, 49770, 49773, 80 VOXEL-DOT-NETUS United States 13->43 45 43 other IPs or domains 13->45 file6 signatures7 process8 dnsIp9 35 dwrqljrr.biz 173.231.184.122, 49695, 49696, 49742 VOXEL-DOT-NETUS United States 18->35 37 saytjshyf.biz 173.231.184.124, 49727, 49735, 49761 VOXEL-DOT-NETUS United States 18->37 39 36 other IPs or domains 18->39 23 C:\Windows\System32\xbgmsvc.exe, PE32+ 18->23 dropped 25 C:\Windows\System32\wbengine.exe, PE32+ 18->25 dropped 27 C:\Windows\System32\wbem\WmiApSrv.exe, PE32+ 18->27 dropped 29 90 other malicious files 18->29 dropped 55 Tries to harvest and steal browser information (history, passwords, etc) 18->55 57 Drops executable to a common third party application directory 18->57 59 Infects executable files (exe, dll, sys, html) 18->59 file10 signatures11
Threat name:
ByteCode-MSIL.Trojan.Tnega
Status:
Malicious
First seen:
2023-05-02 06:54:04 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
DarkCloud
Unpacked files
SH256 hash:
92f75c9e6d6c31a70a77feadd928bc52259dedf2b7e9c60a9d7a476d6b1d521b
MD5 hash:
31ae0e7ac901b5f96426d70f8eaa6210
SHA1 hash:
479eb5b55b5a36c6ca34acc4d10e7a64ebddfc77
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
40c050c20d957d26b932faf690f9c2933a194aa6607220103ec798f46ac03403
MD5 hash:
c768bac25fc6f0551a11310e7caba8d5
SHA1 hash:
95f9195e959fb48277c95d1dd1c97a4edff7cb3a
SH256 hash:
9b7870cd3f4323ee5fc139f8a1cda8188327971d091fdfe14f514298dbb02fae
MD5 hash:
15d9b60dd9bed35ece60b30ab170095c
SHA1 hash:
5fab09d94658050a298d7d84713d1f60f44c5647
SH256 hash:
51e9b813382cd853599dab2833b2f70a358b5f2a72e91a8b5395ad6c45b63135
MD5 hash:
e7fb72dcd0dd9b9aa2421168f6278f91
SHA1 hash:
30c95a8ea72ecfbd6be438659474074e6934912c
SH256 hash:
8362a107d309eb065d84b5780573c9fd37827ff8f975eaa758b6cec1091172fc
MD5 hash:
c23099f8f63823b69870bfbf7749ecef
SHA1 hash:
2651b69408237d6854e68fc610ea8bb12acae4fd
SH256 hash:
5e145f3d5e24329097fa02ef9c9f8f72379478a9366be08aca8b5e0fd7993b94
MD5 hash:
d19ba9118b8d05a899135c4e9dc4925a
SHA1 hash:
1180ff2f671eaf25da97417b6f144a4610d59c2c
SH256 hash:
fb71b9df885463cb148e10ddad2b81ca883ce2dcc0a7739808a3e5d203f9d00b
MD5 hash:
d6d89eff8ae95f17795daf44ddc35389
SHA1 hash:
a7cf42f11071fe319b4e73203ca8269fb38f008c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

Executable exe fb71b9df885463cb148e10ddad2b81ca883ce2dcc0a7739808a3e5d203f9d00b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments