General
-
Target
31102023_2331_StartInstaller.js
-
Size
135KB
-
Sample
231031-syq7taae4s
-
MD5
ddcba7389f0d1e6f2136434337077180
-
SHA1
767db09b9d97cbc4f302ec9b994541630da91d32
-
SHA256
3a9494dd4b5de532abfffc60639bd1347e41f60582954a14d7c1e32ede07d8b0
-
SHA512
0a7ed12a97e414bb2cbbd99243000ffef58b1c79ef87da8d43633b8968d0a397d77b21d1c4ee62290ebbd5c940016953a80e41f8ffa9ebad21f718a1ef064bba
-
SSDEEP
1536:hZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/04:UT9U7hgaX6eerjqlI2IO6Mzqffxu
Static task
static1
Behavioral task
behavioral1
Sample
31102023_2331_StartInstaller.js
Resource
win7-20231023-en
Malware Config
Extracted
darkgate
ADS5
http://sftp.noheroway.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
443
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
KNzcPHwYGBphRR
-
internal_mutex
txtMut
-
minimum_disk
40
-
minimum_ram
7000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
ADS5
Targets
-
-
Target
31102023_2331_StartInstaller.js
-
Size
135KB
-
MD5
ddcba7389f0d1e6f2136434337077180
-
SHA1
767db09b9d97cbc4f302ec9b994541630da91d32
-
SHA256
3a9494dd4b5de532abfffc60639bd1347e41f60582954a14d7c1e32ede07d8b0
-
SHA512
0a7ed12a97e414bb2cbbd99243000ffef58b1c79ef87da8d43633b8968d0a397d77b21d1c4ee62290ebbd5c940016953a80e41f8ffa9ebad21f718a1ef064bba
-
SSDEEP
1536:hZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/04:UT9U7hgaX6eerjqlI2IO6Mzqffxu
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-