General
-
Target
stopdoingthis.msi
-
Size
7.7MB
-
Sample
231024-wr8p3afh65
-
MD5
599423697dafc91edf9cc90aba306646
-
SHA1
a6f3060af91d9bbea8e72a23b5f92896edf4c3a9
-
SHA256
12f5d9383518e88b0b7b857b946d33de8c9a075b1b348a7df83ae983c5fefeaa
-
SHA512
862f6452f8bb0108d8b5535a5bdd35e0c452c0993fa0d6ec5b6f9d059c2711fe4748e25ab201a16bace528c81abd4fb21e60e384eb123185dda19d5bb2af4a80
-
SSDEEP
98304:TpFKjsEZcgsdUqakFRFawTV82ASqQBW9vpWzxjFycvniqy33XglSB2CiU39hItDb:61NsUqai/pTOryNnxyXxBTiWKmbSQMR
Static task
static1
Behavioral task
behavioral1
Sample
stopdoingthis.msi
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
stopdoingthis.msi
Resource
win10v2004-20231020-en
Malware Config
Extracted
darkgate
user_871236672
http://onlineserviceboonkers.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
yBhTbTZsxrLjqz
-
internal_mutex
txtMut
-
minimum_disk
35
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Targets
-
-
Target
stopdoingthis.msi
-
Size
7.7MB
-
MD5
599423697dafc91edf9cc90aba306646
-
SHA1
a6f3060af91d9bbea8e72a23b5f92896edf4c3a9
-
SHA256
12f5d9383518e88b0b7b857b946d33de8c9a075b1b348a7df83ae983c5fefeaa
-
SHA512
862f6452f8bb0108d8b5535a5bdd35e0c452c0993fa0d6ec5b6f9d059c2711fe4748e25ab201a16bace528c81abd4fb21e60e384eb123185dda19d5bb2af4a80
-
SSDEEP
98304:TpFKjsEZcgsdUqakFRFawTV82ASqQBW9vpWzxjFycvniqy33XglSB2CiU39hItDb:61NsUqai/pTOryNnxyXxBTiWKmbSQMR
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-