Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
26-10-2023 15:26
Behavioral task
behavioral1
Sample
26102023_2326_drkgate_data2.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
26102023_2326_drkgate_data2.exe
Resource
win10v2004-20231023-en
General
-
Target
26102023_2326_drkgate_data2.exe
-
Size
405KB
-
MD5
2c48c5f619dd7ad5b6d4c36f56489a66
-
SHA1
661371c42e8aec0364a46210706cab150e42ede4
-
SHA256
14ed8ae1a9d44a500f57fa0273162907c05e31d8da92c474944bbd74f55d19b1
-
SHA512
62f28bb6ce33ef5598587819f5ec56ccccf138eef7b3e2d165ac9a0aa3c11da1b5e3f457ebdb05690e3d052961630876552f61e2bbfdb89533d0ba7b3327ae00
-
SSDEEP
6144:V5UTExW+vRaLjH5XVEqVomFDXfRhnJWoS1gAlCWZ44w:jUTExWnLjH5XVEqVvvnJWoSiAlTZ4
Malware Config
Extracted
darkgate
user_871236672
http://hadfadf87yuadfad.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
CbTWFsAhFuOWYT
-
internal_mutex
txtMut
-
minimum_disk
40
-
minimum_ram
7000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 26102023_2326_drkgate_data2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 26102023_2326_drkgate_data2.exe