General
-
Target
ffa38ff8c434945de11b621958170a10.bin
-
Size
34KB
-
Sample
231103-enw4esbh21
-
MD5
076ba71543eaf1fcd91685137c9095ff
-
SHA1
37d717023a3543da8283ac2a6a787934e30ac0b9
-
SHA256
331d71f132589286dc4da662a7846011992ad9ea7d0a672734ec7fe686ca4f42
-
SHA512
61d6401f031306d08959bb4d93d31f8171953d0d481a2686456f2d411d6c8feadf546c9ca0387cff7daab90f4b6aaa9169e9afc67bc8e80f190988dd39aa6149
-
SSDEEP
768:srU0L3ZqYdS7IRv/yOjOqqTLMAgYjQhE1cWoYdWk9mtJy6LP0:fmIUSg/xKBTEyMNJyQ8
Static task
static1
Behavioral task
behavioral1
Sample
4dce8991fb2942cb8443aba697311072aa25fc61b4b4186a54e7956c2bec6799.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4dce8991fb2942cb8443aba697311072aa25fc61b4b4186a54e7956c2bec6799.js
Resource
win10v2004-20231023-en
Malware Config
Extracted
darkgate
user_871236672
http://shsukadadyuikmmonk.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
WccksaEfoXLLtV
-
internal_mutex
txtMut
-
minimum_disk
50
-
minimum_ram
6001
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Targets
-
-
Target
4dce8991fb2942cb8443aba697311072aa25fc61b4b4186a54e7956c2bec6799.js
-
Size
135KB
-
MD5
ffa38ff8c434945de11b621958170a10
-
SHA1
6429a10526d4224e5a9d5e4ab9f71cfa3a1bd460
-
SHA256
4dce8991fb2942cb8443aba697311072aa25fc61b4b4186a54e7956c2bec6799
-
SHA512
f4f5fcde08d4ab8d167071ba9eed55cb4d575251da66fcd8005a85970f26e07be31a6f65a42ff47ee238e498f66fef625c97eabe0c87eee3f18ae1d3f98d022a
-
SSDEEP
1536:BZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/0c:0T9U7hgaX6eerjqlI2IO6Mzqfpu
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-