General
-
Target
d402f30e4f9bc2f6d470384591bf9b34.bin
-
Size
1.6MB
-
Sample
231011-pryrjahg36
-
MD5
0dedf48761833a167a4e0c38c1347de7
-
SHA1
825b777d2211ceb9dd011521b89eb0e70e57c443
-
SHA256
80062d028573ccc1aa099bce4ace31aeb0f6e6410cdf32f13bbc54fa8bbb71d0
-
SHA512
a9c9b135a6fb8be798ffe1b078a2aac9adea20da0c11d3bdf0665812a03ba774263083f41ed88370cfbfa0a3a40ba144b7593396a3b0151573b86e531d529cc8
-
SSDEEP
24576:QtiL1og0uy1uLrfbSJpPNHVd677Oug5ZkvyZODwlanjwHU+thhs3/WqUyIQbhSIr:Qq1ogVyrPN1d0oeqZiwswHU+M/WTYQIr
Static task
static1
Behavioral task
behavioral1
Sample
08c31ed8f0574544769c024a57bc57daa9e444f57845ebd41b2a5213901d4667.msi
Resource
win7-20230831-en
Malware Config
Extracted
darkgate
AA11
http://94.228.169.143
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
bABouSDRyBocvj
-
internal_mutex
txtMut
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
AA11
Targets
-
-
Target
08c31ed8f0574544769c024a57bc57daa9e444f57845ebd41b2a5213901d4667.msi
-
Size
1.8MB
-
MD5
d402f30e4f9bc2f6d470384591bf9b34
-
SHA1
37f73ff4f0bb88ddd5605cf696e8947d63a79c97
-
SHA256
08c31ed8f0574544769c024a57bc57daa9e444f57845ebd41b2a5213901d4667
-
SHA512
290a714cefa8ebf375ab439bf4e4083c93d49d843c39d9b83a2fe03e13619e425066becabadfb0491192ebd2b7bfad6fc6c407c40af8800293a2a4a59b011dba
-
SSDEEP
49152:epUPfjpSNeHaHGYayNId4pWL56Hq05vHjYL57CBN4/6sT:epeeHGKId+W1n6/01kN4ysT
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-