General
-
Target
5bc060bd720757919db4f54f97e74b7110c67cf934423f86ffd483c7e2c367e2_JC.msi
-
Size
2.2MB
-
Sample
231011-2j9kaahb5w
-
MD5
7758d5af5470ac0005fed5ec83c5ab2a
-
SHA1
2e0d4798c12a7d71ad45a621dddb750bae0cd23b
-
SHA256
5bc060bd720757919db4f54f97e74b7110c67cf934423f86ffd483c7e2c367e2
-
SHA512
307c4960dc654ae945b6d351547a755b294ea2b9ee40b0c1556e2fb77c11a7dc20978532ea753978d7b2d20126fb73c8343c9ed3b132ed763c47003ddecb8096
-
SSDEEP
49152:YpUPIHOfHNhe86pb8eVx6zp/VGecycgnE5pPSI3a:YpZuPNhZcb8ejSp/VG1wIq
Static task
static1
Behavioral task
behavioral1
Sample
5bc060bd720757919db4f54f97e74b7110c67cf934423f86ffd483c7e2c367e2_JC.msi
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5bc060bd720757919db4f54f97e74b7110c67cf934423f86ffd483c7e2c367e2_JC.msi
Resource
win10v2004-20230915-en
Malware Config
Extracted
darkgate
AA11
http://94.228.169.143
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
zNgEWggCEDfkev
-
internal_mutex
txtMut
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
AA11
Targets
-
-
Target
5bc060bd720757919db4f54f97e74b7110c67cf934423f86ffd483c7e2c367e2_JC.msi
-
Size
2.2MB
-
MD5
7758d5af5470ac0005fed5ec83c5ab2a
-
SHA1
2e0d4798c12a7d71ad45a621dddb750bae0cd23b
-
SHA256
5bc060bd720757919db4f54f97e74b7110c67cf934423f86ffd483c7e2c367e2
-
SHA512
307c4960dc654ae945b6d351547a755b294ea2b9ee40b0c1556e2fb77c11a7dc20978532ea753978d7b2d20126fb73c8343c9ed3b132ed763c47003ddecb8096
-
SSDEEP
49152:YpUPIHOfHNhe86pb8eVx6zp/VGecycgnE5pPSI3a:YpZuPNhZcb8ejSp/VG1wIq
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-