Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-10-2023 13:40
Behavioral task
behavioral1
Sample
mkpub_AU_Darkgate.exe
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
General
-
Target
mkpub_AU_Darkgate.exe
-
Size
481KB
-
MD5
9bf2ae2da16e9a975146c213abd7cd4f
-
SHA1
b4850a42227dc43d4079392eb3a449e8a3f6312d
-
SHA256
74729d4569691daf72e23849e91461471411f551639663e11e1091a48790611e
-
SHA512
64a789860f2ffa9a57594de7cbd7d2e78aee0380a2caad54cba7495f39a509177206f2d3bc85ec3a074164349395598cc7c1a57914409939e22e1ed272078623
-
SSDEEP
12288:73wfF2uWIOyAxbhWyElk3Xb8ruWqW3GMRIYQIpezqnu5/9aJCE:7S2uWyAXWyElwL8rjv3qYdpez+u581
Malware Config
Extracted
Family
darkgate
C2
http://getldrrgoodgame.com
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mkpub_AU_Darkgate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mkpub_AU_Darkgate.exe