Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2023 16:58
Behavioral task
behavioral1
Sample
27102023_0057_drkgate_winj_data2.exe
Resource
win7-20231023-en
windows7-x64
2 signatures
150 seconds
General
-
Target
27102023_0057_drkgate_winj_data2.exe
-
Size
405KB
-
MD5
17372752e7b371bf0c1472aba5f87fb8
-
SHA1
82a1699590fe9b2dc9d2f1861029f7c7dda47e0b
-
SHA256
2fbe2d2beeff34cd8677a98d3e4eb4eb865fee938d632f478317218c41083c66
-
SHA512
978c6308b80bf070d380141f4912b51c1335f5b8c2993f4ff6db48dcc8a8256bac3aabc023bcda0a53fdeaf07c62b569ce1894d1eee402a091faf99272f6f4ab
-
SSDEEP
6144:V5UTExW+vRaLjH5XVEqVomFDXfRhnJWoS1gAlCWZ4Yw:jUTExWnLjH5XVEqVvvnJWoSiAlTZ4
Malware Config
Extracted
Family
darkgate
Botnet
ADS5
C2
http://sftp.bitepieces.com
Attributes
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
443
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
KnqeTJUYsrnUBP
-
internal_mutex
txtMut
-
minimum_disk
40
-
minimum_ram
7000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
ADS5
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 27102023_0057_drkgate_winj_data2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 27102023_0057_drkgate_winj_data2.exe