General
-
Target
07112023_2238_app(060e45bf7b57d4).js
-
Size
252KB
-
Sample
231107-rzsllabe95
-
MD5
9edd0adf749c9406b020d9ca613daa62
-
SHA1
701cc4130fd3b8b17d6692101b7bd80d9a14b68c
-
SHA256
aff263702a19eb6640636f8c2708147a5ce8a5577d86a57224ddbe0f51c7dafe
-
SHA512
99df3475b72b2576123a7a46338470346b30e6ac10d9bd8506c6b359de2bf7308d0d85ece3039f3388d6feed7a6e7774eb4300c4ecc4435bf6361e59ab8e52da
-
SSDEEP
6144:ge7hgXeerjqlI2Iro+ra4xB9ElITe7hgXeerjqlI2Iro+8:gIhgSlI23qa4xB9ElITIhgSlI23V
Static task
static1
Behavioral task
behavioral1
Sample
07112023_2238_app(060e45bf7b57d4).js
Resource
win7-20231023-en
Malware Config
Extracted
darkgate
ADS5
http://siliconerumble.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
443
-
check_disk
false
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
CXKvjwjmjoZnik
-
internal_mutex
txtMut
-
minimum_disk
40
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
ADS5
Targets
-
-
Target
07112023_2238_app(060e45bf7b57d4).js
-
Size
252KB
-
MD5
9edd0adf749c9406b020d9ca613daa62
-
SHA1
701cc4130fd3b8b17d6692101b7bd80d9a14b68c
-
SHA256
aff263702a19eb6640636f8c2708147a5ce8a5577d86a57224ddbe0f51c7dafe
-
SHA512
99df3475b72b2576123a7a46338470346b30e6ac10d9bd8506c6b359de2bf7308d0d85ece3039f3388d6feed7a6e7774eb4300c4ecc4435bf6361e59ab8e52da
-
SSDEEP
6144:ge7hgXeerjqlI2Iro+ra4xB9ElITe7hgXeerjqlI2Iro+8:gIhgSlI23qa4xB9ElITIhgSlI23V
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-