Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2023 14:20
Behavioral task
behavioral1
Sample
18102023_2220_drkgate_1810.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
18102023_2220_drkgate_1810.exe
Resource
win10v2004-20230915-en
General
-
Target
18102023_2220_drkgate_1810.exe
-
Size
409KB
-
MD5
d69d4f0f25c124b7e44172fa982d155e
-
SHA1
360c68eccee862f3c8b511178acca04acac1193c
-
SHA256
75a66b2626f670bd4549510edcd75488169ebf5d6d2d233801e0da6be977629d
-
SHA512
c098f36fdbd525d63837ef10fb5dc405b8ad73d08124f1317646c121aec8b57b0447190234cd82d671bc0d9d51a54f304a23d7a882e8cf82583fa09a3315bcef
-
SSDEEP
6144:pfZk2/Zu30WbMAOozifhNay3p3yra20fSjNPJ5AOSd5d:bkkZuEWzOozifhNarFjNBfi7
Malware Config
Extracted
darkgate
user_871236672
http://cheneseemeg7575.cash
http://annoyingannoying.vodka
http://uiahbmajokriswhoer.net
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
TqpMuqGfTpFnfb
-
internal_mutex
txtMut
-
minimum_disk
35
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 18102023_2220_drkgate_1810.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 18102023_2220_drkgate_1810.exe