General
-
Target
31ae2a2367b4fc.msi
-
Size
8.6MB
-
Sample
231107-s5w2msbb51
-
MD5
37593bb56df9b3ad6c9c8b777a7265ad
-
SHA1
ee06b5c4da2721323cfef688e48cf917c9f0edce
-
SHA256
92ffa8c1f772ff5487bb29f1539148bd6893ab4abf1de7ed603f84cbc39deddb
-
SHA512
f5e041d4ea406cf74fd43fec903ba98881d5762fffd8ee43a3a308a795eb0eeff093507b0b03f14497a5e30908fe5d5118c5a507ec10c78fc90c269f10ddfe2e
-
SSDEEP
196608:IeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9SyqunTiE7vS+:IdhVs6WXjX9HZ5AQX32WDjyqumI
Static task
static1
Behavioral task
behavioral1
Sample
31ae2a2367b4fc.msi
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
31ae2a2367b4fc.msi
Resource
win10v2004-20231025-en
Malware Config
Extracted
darkgate
user_871236672
http://8sjimonstersboonkonline.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
false
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
RndioOljcBmadZ
-
internal_mutex
txtMut
-
minimum_disk
42
-
minimum_ram
6001
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Targets
-
-
Target
31ae2a2367b4fc.msi
-
Size
8.6MB
-
MD5
37593bb56df9b3ad6c9c8b777a7265ad
-
SHA1
ee06b5c4da2721323cfef688e48cf917c9f0edce
-
SHA256
92ffa8c1f772ff5487bb29f1539148bd6893ab4abf1de7ed603f84cbc39deddb
-
SHA512
f5e041d4ea406cf74fd43fec903ba98881d5762fffd8ee43a3a308a795eb0eeff093507b0b03f14497a5e30908fe5d5118c5a507ec10c78fc90c269f10ddfe2e
-
SSDEEP
196608:IeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9SyqunTiE7vS+:IdhVs6WXjX9HZ5AQX32WDjyqumI
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-