General
-
Target
w_verion_6.1.1_x86.msi
-
Size
2.2MB
-
Sample
231013-d1wgzsce7w
-
MD5
27a14ed7a94bbbf8dabacd509cb4bf0f
-
SHA1
097c6021a05ae5dc95a3b6e4dc4deb2583a8b26a
-
SHA256
8ce6620ef7346fbb807b72293ce965b05b5cd37036a9d3a17c834b79e15910f4
-
SHA512
78c9d918d17eff9b5662c97adae0942722f64a3864c61e8cd3999dd7210ca9a2b34ab1380ae61091c4fee3602a45f6b6034b9b34580977801de8e2e5beee5f70
-
SSDEEP
49152:QpUPhzTtpSD6TmCFMZ9Iv1s6kXhH3jtG1+iH4nDcGdi2gzblP9QNIT5QBtg2:QpgntID67vvLkX5BGVOfcblFQCS
Static task
static1
Behavioral task
behavioral1
Sample
w_verion_6.1.1_x86.msi
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
w_verion_6.1.1_x86.msi
Resource
win10v2004-20230915-en
Malware Config
Extracted
darkgate
ioeooow8ur
http://cdn-ext.net
-
alternative_c2_port
8080
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
nEtvEVFAjZwGiB
-
internal_mutex
cbdKcC
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
ioeooow8ur
Targets
-
-
Target
w_verion_6.1.1_x86.msi
-
Size
2.2MB
-
MD5
27a14ed7a94bbbf8dabacd509cb4bf0f
-
SHA1
097c6021a05ae5dc95a3b6e4dc4deb2583a8b26a
-
SHA256
8ce6620ef7346fbb807b72293ce965b05b5cd37036a9d3a17c834b79e15910f4
-
SHA512
78c9d918d17eff9b5662c97adae0942722f64a3864c61e8cd3999dd7210ca9a2b34ab1380ae61091c4fee3602a45f6b6034b9b34580977801de8e2e5beee5f70
-
SSDEEP
49152:QpUPhzTtpSD6TmCFMZ9Iv1s6kXhH3jtG1+iH4nDcGdi2gzblP9QNIT5QBtg2:QpgntID67vvLkX5BGVOfcblFQCS
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-