General
-
Target
434a13.msi.zip
-
Size
2.1MB
-
Sample
231014-dmbknafa42
-
MD5
71f4c042682719671c03cca48047909e
-
SHA1
f437d770d937ced05f009ff3636e44f3e66fa9d6
-
SHA256
4b43e46ada9ab339f93065a0941356523b96906becfdce37779629f6f57852d0
-
SHA512
1b08ecbcc454801e73f4908a5e3f16205c258bb4277717dfd524e7fcd21c7c7f441c434463950bbaa1275d4d31274bc7c87de40254ae0731191ee9e70117cf83
-
SSDEEP
49152:L2E8qDOr5guooEg0LGWZc05Q/B9Du/Gcr6Oj2U/sgSSiFNphMV:LL8qD4gnoPsgK6fuLStE
Static task
static1
Behavioral task
behavioral1
Sample
510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f.msi
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f.msi
Resource
win10v2004-20230915-en
Malware Config
Extracted
darkgate
ioeooow8ur
http://178.236.247.102
-
alternative_c2_port
9999
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
27850
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
RjRZGzBFKKciHs
-
internal_mutex
cbdKcC
-
minimum_disk
50
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
ioeooow8ur
Targets
-
-
Target
510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f
-
Size
2.2MB
-
MD5
eb6c9dd67ac627ad54d1d9d98f6b779b
-
SHA1
253d0ec6919bffc194e1574806e3c8b1a7e7fcfc
-
SHA256
510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f
-
SHA512
9ba437b075964d45f1f48f5fdfae4259d7480dfbc511ca567d054c0ec5c56df4a90867ed00d1955d2686100a12ad91c11136c7a657d85146578fe9251e094bc0
-
SSDEEP
49152:ypUPhpzVy45pV1KnCx9HYMLEnYnHzIEdsvtyOABCRv4hMh:ypgpzVhpTKnC/4MLEizIbtUBCRv4q
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-