General
-
Target
5cc2ecc53d742b200482b633d471df19bdf979796e8289d89f50cea2.vbs
-
Size
142KB
-
Sample
231006-qq8qsaea74
-
MD5
86133160c59d00c0ca11c9716ee3f546
-
SHA1
941b5b828aa1ae3b5a68772ec31ac06158836b3f
-
SHA256
9921e057693d70d2f6bf13a04abf816c10fe209cff82cb533596ed313b9d2154
-
SHA512
d48841717c9876c69d6134c40ffe4597a296b55252675de694b462a58ce3b915840bed844bcabe69cc88be46b521d033954256aa479a778e8adad7fce4659ca3
-
SSDEEP
3072:k1KicwmC8osLn8CKmbOTtLJ+1Lqa6UndLvGi6tKYgHDNbWvi:k1OjC8oenlKmbOTn3a6UnMimONb3
Static task
static1
Behavioral task
behavioral1
Sample
5cc2ecc53d742b200482b633d471df19bdf979796e8289d89f50cea2.vbs
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5cc2ecc53d742b200482b633d471df19bdf979796e8289d89f50cea2.vbs
Resource
win10v2004-20230915-en
Malware Config
Extracted
darkgate
usr_871663321
http://fredlomberhfile.com
-
alternative_c2_port
443
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
hQRoFscUtYUcau
-
internal_mutex
txtMut
-
minimum_disk
35
-
minimum_ram
7000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
usr_871663321
Targets
-
-
Target
5cc2ecc53d742b200482b633d471df19bdf979796e8289d89f50cea2.vbs
-
Size
142KB
-
MD5
86133160c59d00c0ca11c9716ee3f546
-
SHA1
941b5b828aa1ae3b5a68772ec31ac06158836b3f
-
SHA256
9921e057693d70d2f6bf13a04abf816c10fe209cff82cb533596ed313b9d2154
-
SHA512
d48841717c9876c69d6134c40ffe4597a296b55252675de694b462a58ce3b915840bed844bcabe69cc88be46b521d033954256aa479a778e8adad7fce4659ca3
-
SSDEEP
3072:k1KicwmC8osLn8CKmbOTtLJ+1Lqa6UndLvGi6tKYgHDNbWvi:k1OjC8oenlKmbOTn3a6UnMimONb3
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-