Analysis
-
max time kernel
137s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2023 01:16
Behavioral task
behavioral1
Sample
09112023_0916_drkgate_fsg_spm.exe
Resource
win7-20231023-en
2 signatures
150 seconds
General
-
Target
09112023_0916_drkgate_fsg_spm.exe
-
Size
405KB
-
MD5
8450cea033346e20b30444e04e137000
-
SHA1
04a48c419e1750716875af0c2c3474adfec6a609
-
SHA256
c5775c5ad594d3d2e97f76b7a9a252a9ac1b0a4b93dc8ba641815972f0c796eb
-
SHA512
64b1d5dce7cd9f48305c46010d2fa956e05a750d5d5cbf724e31735de29882cb4b4b4799f7616414742997cef36afad10aa6dab1c501ba2f7bb6c8debd1f30e9
-
SSDEEP
6144:+5UHKhp9UQpT0E3OWRytzcUE/GLRqpBwPfoCc4S3XuivrjkXRJf6:oUHKJ0E3OWRytCi6BwPyTnuivvkXR
Malware Config
Extracted
Family
darkgate
Botnet
PLEX
C2
http://homeservicetreking.com
Attributes
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
8443
-
check_disk
false
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
UxRmvbdCWVKFVZ
-
internal_mutex
txtMut
-
minimum_disk
20
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
PLEX
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 09112023_0916_drkgate_fsg_spm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 09112023_0916_drkgate_fsg_spm.exe