Analysis
-
max time kernel
140s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 01:11
Behavioral task
behavioral1
Sample
08112023_0911_drkgate_fsg_spm.exe
Resource
win7-20231023-en
2 signatures
150 seconds
General
-
Target
08112023_0911_drkgate_fsg_spm.exe
-
Size
405KB
-
MD5
45fd06ce41cefdff0b3038e1aca6d416
-
SHA1
a47cdd041d2939160bd2fdef1d891102d560dcdf
-
SHA256
67e6088523343619422a8c611dd461c88922e46f05093478af6cde5547e729e6
-
SHA512
87b225b7ffad317e465ad9168195f117c948e20409453226fb53d31f1d59220b0d9c87b8c8d192b6d6f88a9dcd3a863cd43dffa577c9aec650018b8de0e496a2
-
SSDEEP
12288:qUTEs7agp+jEWmKsIBvVpvnwSKwqy0fMM:qHscjEWmKsIBvvwSpqygF
Malware Config
Extracted
Family
darkgate
Botnet
PLEX
C2
http://adfincolniclo.com
Attributes
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
8443
-
check_disk
false
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
XlGcWKEQCWdmzP
-
internal_mutex
txtMut
-
minimum_disk
18
-
minimum_ram
6005
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
PLEX
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 08112023_0911_drkgate_fsg_spm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 08112023_0911_drkgate_fsg_spm.exe