Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2023 15:36
Behavioral task
behavioral1
Sample
09112023_2336_drkgate_fsg_spm.exe
Resource
win7-20231023-en
windows7-x64
2 signatures
150 seconds
General
-
Target
09112023_2336_drkgate_fsg_spm.exe
-
Size
405KB
-
MD5
bb3bee431f19a5de2c32272fd9093830
-
SHA1
c91b69f7687fd678f9ac978b6d922ac070c3c3ee
-
SHA256
a603b0876d0431e934b157d38e5f16b8e77e166798e5f6fabccf43908e266b62
-
SHA512
998ab1ba64b3c3231a3699dabad9647c09c1fe9f7ea1fa14032312c6e647c28c6a9ca6bc58520f5d8ac805b99904954ef4adfcea6bc9f194f3c37b46cb117b67
-
SSDEEP
6144:+5UHKhp9UQpT0E3OWRytzcUE/GLRqpBwPfoCc4S3XuivrjkXRJfp:oUHKJ0E3OWRytCi6BwPyTnuivvkXR
Malware Config
Extracted
Family
darkgate
Botnet
ADS5
C2
http://siliconerumble.com
Attributes
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
443
-
check_disk
false
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
IVGEhYkpeLqmJU
-
internal_mutex
txtMut
-
minimum_disk
32
-
minimum_ram
6005
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
ADS5
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 09112023_2336_drkgate_fsg_spm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 09112023_2336_drkgate_fsg_spm.exe