General
-
Target
4f238c2093606fc296f1f819c2f0fc67.bin
-
Size
1.9MB
-
Sample
240202-blmkescfhn
-
MD5
c9579ebe20c4993367657239cb76219a
-
SHA1
019e645687a95ea26b72f76edaaf4d7c9d444bc4
-
SHA256
4278a930d1fd15b6c7e28b221e3ea41025ed19a4c01510fbe302177191389002
-
SHA512
4dbe146d140ad5f40aacfad3ff34b18527fe38f710985042146d7d3a9532c0cd80ec905f133c33bc7866478d3d5745343ac17f6156c6def0b1317907fa985363
-
SSDEEP
49152:BnLh5HW8AcyiKV9vHyXhhDiGK895KMLO+GfdrflFp:BnV5HWwDgAXrb5FLOv
Static task
static1
Behavioral task
behavioral1
Sample
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.msi
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.msi
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.msi
-
Size
4.3MB
-
MD5
4f238c2093606fc296f1f819c2f0fc67
-
SHA1
f8535858fcee6b96e0f49e6156fa110fc0698880
-
SHA256
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994
-
SHA512
c2422db8871d6303b5903c4b11cca3debd62cb25a406655db5a0ba407f33c9fef739371d297e5ccad45efc99e040e6ae29079b4b9325f52d54c5e780f8c346f7
-
SSDEEP
49152:jpUPN9qhCxzT+WKjSXcmNt6+XzP4BYIeBfCXqyfdo1DDDDDDDDDDPuDgO9hTnxA5:jpqCQbm+jg12f3yaiga6yU
Score10/10-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Scripting
1