General
-
Target
1.msi
-
Size
1.8MB
-
Sample
231011-xnwrrsfe5t
-
MD5
d402f30e4f9bc2f6d470384591bf9b34
-
SHA1
37f73ff4f0bb88ddd5605cf696e8947d63a79c97
-
SHA256
08c31ed8f0574544769c024a57bc57daa9e444f57845ebd41b2a5213901d4667
-
SHA512
290a714cefa8ebf375ab439bf4e4083c93d49d843c39d9b83a2fe03e13619e425066becabadfb0491192ebd2b7bfad6fc6c407c40af8800293a2a4a59b011dba
-
SSDEEP
49152:epUPfjpSNeHaHGYayNId4pWL56Hq05vHjYL57CBN4/6sT:epeeHGKId+W1n6/01kN4ysT
Static task
static1
Behavioral task
behavioral1
Sample
1.msi
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1.msi
Resource
win10v2004-20230915-en
Malware Config
Extracted
darkgate
AA11
http://94.228.169.143
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
bABouSDRyBocvj
-
internal_mutex
txtMut
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
AA11
Targets
-
-
Target
1.msi
-
Size
1.8MB
-
MD5
d402f30e4f9bc2f6d470384591bf9b34
-
SHA1
37f73ff4f0bb88ddd5605cf696e8947d63a79c97
-
SHA256
08c31ed8f0574544769c024a57bc57daa9e444f57845ebd41b2a5213901d4667
-
SHA512
290a714cefa8ebf375ab439bf4e4083c93d49d843c39d9b83a2fe03e13619e425066becabadfb0491192ebd2b7bfad6fc6c407c40af8800293a2a4a59b011dba
-
SSDEEP
49152:epUPfjpSNeHaHGYayNId4pWL56Hq05vHjYL57CBN4/6sT:epeeHGKId+W1n6/01kN4ysT
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-