General
-
Target
e7fb7aa7dc05e76b1c8054a9a375158f.bin
-
Size
1.9MB
-
Sample
240202-cb3pbsdebk
-
MD5
ce5b90b6177442eb8669f5f9cca01798
-
SHA1
559ae3c1ffacc211dfdfe9df1daaea606631e59a
-
SHA256
14ca3dc03e22d3794c7f7c133426128ad4f4fdcc907febcf3954e53b1acb1e9f
-
SHA512
7754752b8dec88ce47bba02c2416e735d248a3b88ed3957dc2773cf98ea42ebe48764d206f02fc0002c904892d25858aceab5d108ed313b4ab5dfdff8e64c956
-
SSDEEP
49152:VqbGluCvOFwxdDPqfUy9rM0K9VGN4y9ABvJPky38uaQPg:+rOHH2rrjK9YCUSvJsysutPg
Static task
static1
Behavioral task
behavioral1
Sample
mkreafr.msi
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
mkreafr.msi
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
mkreafr.msi
-
Size
4.3MB
-
MD5
4f238c2093606fc296f1f819c2f0fc67
-
SHA1
f8535858fcee6b96e0f49e6156fa110fc0698880
-
SHA256
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994
-
SHA512
c2422db8871d6303b5903c4b11cca3debd62cb25a406655db5a0ba407f33c9fef739371d297e5ccad45efc99e040e6ae29079b4b9325f52d54c5e780f8c346f7
-
SSDEEP
49152:jpUPN9qhCxzT+WKjSXcmNt6+XzP4BYIeBfCXqyfdo1DDDDDDDDDDPuDgO9hTnxA5:jpqCQbm+jg12f3yaiga6yU
Score10/10-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Scripting
1