Analysis
-
max time kernel
38s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18-10-2023 16:07
Behavioral task
behavioral1
Sample
19102023_0007_destroy_drkgate.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
19102023_0007_destroy_drkgate.exe
Resource
win10v2004-20230915-en
General
-
Target
19102023_0007_destroy_drkgate.exe
-
Size
409KB
-
MD5
5982a6c74a302124f0210143ff1ed9d2
-
SHA1
dc290e7fc56dcbad75397759565a00015cdd44e3
-
SHA256
6ff821358f4be12dbd834569d65bd73105e6a7f3a13fe46c2abf6904436287a2
-
SHA512
9f6758bbeede384f5bf56216a9aa2fd5c67b16fe2bc91dd937f784240c3c803acffe2f4aaaa58fa3b785c32a440040c1b247b6d2aeb053413026fef01b869355
-
SSDEEP
6144:pfZk2/Zu30WbMAOozifhNay3p3yra20fSjNPJ5AOSdcd4:bkkZuEWzOozifhNarFjNBfiK4
Malware Config
Extracted
darkgate
user_871236672
http://cheneseemeg7575.cash
http://annoyingannoying.vodka
http://uiahbmajokriswhoer.net
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
TDoGTDSWKFuYaM
-
internal_mutex
txtMut
-
minimum_disk
35
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 19102023_0007_destroy_drkgate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 19102023_0007_destroy_drkgate.exe