Analysis
-
max time kernel
26s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
submitted
26-01-2024 21:28
Behavioral task
behavioral1
Sample
final.exe
Resource
win10-20231220-en
General
-
Target
final.exe
-
Size
3.2MB
-
MD5
24177e15669d5c9a3ba8ca804aa9abfa
-
SHA1
32beebeed89a9fb974ea1563b22694265ec29c56
-
SHA256
0bdf0f1872235196a7e77a04979c2195009681dd0dbb523551dc5a3943d0ae46
-
SHA512
ac0fd5485a3dde47b56c73a0775fd99cc8483ee9552c36528ac135f588e12ed7bef866b17fb73d8dc941f0ab26a5a30bfe47eca453efa0c4789937744b691694
-
SSDEEP
12288:0UEpOEWzuYzy/Bda9AlxhwcySTcth/4N:0fOEWjyZda9uhwlSIf4
Malware Config
Extracted
darkgate
5.2.4
civilian1337
http://185.130.227.202
-
alternative_c2_port
8080
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
true
-
crypto_key
VPsTDMdPtonzYs
-
internal_mutex
txtMut
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
civilian1337
Signatures
-
Darkgate family
-
Detect DarkGate stealer 3 IoCs
resource yara_rule behavioral1/memory/4468-3-0x0000000000400000-0x0000000000465000-memory.dmp family_darkgate_v6 behavioral1/memory/4468-4-0x0000000000400000-0x0000000000465000-memory.dmp family_darkgate_v6 behavioral1/memory/4468-6-0x0000000000400000-0x0000000000465000-memory.dmp family_darkgate_v6 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language final.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 final.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString final.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4468 final.exe 4468 final.exe