Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 18:22
Behavioral task
behavioral1
Sample
04112023_0222_drkgate_fsg_spm.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
04112023_0222_drkgate_fsg_spm.exe
Resource
win10v2004-20231020-en
General
-
Target
04112023_0222_drkgate_fsg_spm.exe
-
Size
405KB
-
MD5
e1d522e0c413e3d1d655f070de1634e2
-
SHA1
abc178c58fadcf7814ffa0f71068c066a17b0f4d
-
SHA256
d068862638b583c61c09dec2b8bd2632485440b3553db170ca9e8c799e97a8b2
-
SHA512
9e6aefd24d70b47fe412e155d1280fe87035e3acec16c13461f480c57927f7a04c22f3578abde89fd195f7e07a8baf1dd0bbd155790df67288aca1c0c5d7f2c3
-
SSDEEP
12288:xUTExWnLjH5XOLiVtikJ537m/DWwtdeH1czUz:xHxWLT5XOLiVtj5rm/awOV8Uz
Malware Config
Extracted
darkgate
user_871236672
http://showmoreresultonliner.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
DDfcMjFaEKfNOW
-
internal_mutex
txtMut
-
minimum_disk
60
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 04112023_0222_drkgate_fsg_spm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 04112023_0222_drkgate_fsg_spm.exe