General
-
Target
Cosmetic product_list_2023_Quatation.Approved.by.CEO.xls.lnk
-
Size
2KB
-
Sample
230929-g7sw8agc2w
-
MD5
f9c403c1c4b55521d5cb06bf5232ca0e
-
SHA1
6f2cd23f0c816475dcbdbc60039c0aa7252a98fd
-
SHA256
716d31755f09d102d83a35276c9c6422c490757eb7c62f9e39a3263ba6057267
-
SHA512
4efcf9f6bf488295c3be1fcf819e618417d86d68125e2bb5d5ac86a8bdcc46d39b0da4276fac787e1881e4d228d64dd4e4bc7dd17dda34351196a59889d28af5
Static task
static1
Behavioral task
behavioral1
Sample
Cosmetic product_list_2023_Quatation.Approved.by.CEO.xls.lnk
Resource
win7-20230831-en
Malware Config
Extracted
darkgate
http://vntricker.abcxzy.com
Targets
-
-
Target
Cosmetic product_list_2023_Quatation.Approved.by.CEO.xls.lnk
-
Size
2KB
-
MD5
f9c403c1c4b55521d5cb06bf5232ca0e
-
SHA1
6f2cd23f0c816475dcbdbc60039c0aa7252a98fd
-
SHA256
716d31755f09d102d83a35276c9c6422c490757eb7c62f9e39a3263ba6057267
-
SHA512
4efcf9f6bf488295c3be1fcf819e618417d86d68125e2bb5d5ac86a8bdcc46d39b0da4276fac787e1881e4d228d64dd4e4bc7dd17dda34351196a59889d28af5
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-