Analysis
-
max time kernel
15s -
max time network
24s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
02-02-2024 10:00
General
-
Target
DarkGate_V6.exe
-
Size
423KB
-
MD5
17d86b557b74b2efa4bd82c8fc627b04
-
SHA1
cc2e2f7a993b11e0ed3fd6995ca8462a334abde4
-
SHA256
aee9287f835f93e6093649a826748e9b27f9921df5ce157d6fee982b8775e853
-
SHA512
8b8d88aa13029943a3a916380c4daf446f873f02a0f14174b1046cb703a12c133bd00d46e5d68c1ae3f72a8c09b2856e90a187c88bddebc96028f3b1835e452d
-
SSDEEP
6144:aKaDxUgUvVcmX+IosmZeuQfvngdMERM/GO7oaaZGoix6Id8SkDMNh/JPyy:3UxGcmXPosmZeuQfvnNRosd8V6R6y
Malware Config
Signatures
-
Detect DarkGate stealer 1 IoCs
resource yara_rule behavioral1/memory/3936-1-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DarkGate_V6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString DarkGate_V6.exe