General
-
Target
2bacda979c484df5fd7784c99fc455b7.bin
-
Size
135KB
-
Sample
231104-b4rxvsdf94
-
MD5
2bacda979c484df5fd7784c99fc455b7
-
SHA1
428d1b68b85af4b318153f97d65214e3f6da19bd
-
SHA256
bac9fd3ebd3834621e46688476885dca7005e78eda48bc9c1271bf9e203afc6a
-
SHA512
6b4f40b7a76b9314c5c6513cc115e2665339181f3d88f50b165abb5a93f0575beeb204d52bc6af3180f3808a1abfb2bf54fd254a06fc9511ab7e651a1dce45d1
-
SSDEEP
1536:BZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/0t:0T9U7hgaX6eerjqlI2IO6Mzqfl
Static task
static1
Behavioral task
behavioral1
Sample
2bacda979c484df5fd7784c99fc455b7.js
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2bacda979c484df5fd7784c99fc455b7.js
Resource
win10v2004-20231020-en
Malware Config
Extracted
darkgate
user_871236672
http://jeraldsin3dsajdklafdmonk.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
jALdIGkuGDFSmI
-
internal_mutex
txtMut
-
minimum_disk
70
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Targets
-
-
Target
2bacda979c484df5fd7784c99fc455b7.bin
-
Size
135KB
-
MD5
2bacda979c484df5fd7784c99fc455b7
-
SHA1
428d1b68b85af4b318153f97d65214e3f6da19bd
-
SHA256
bac9fd3ebd3834621e46688476885dca7005e78eda48bc9c1271bf9e203afc6a
-
SHA512
6b4f40b7a76b9314c5c6513cc115e2665339181f3d88f50b165abb5a93f0575beeb204d52bc6af3180f3808a1abfb2bf54fd254a06fc9511ab7e651a1dce45d1
-
SSDEEP
1536:BZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/0t:0T9U7hgaX6eerjqlI2IO6Mzqfl
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-