General
-
Target
document_reader.exe
-
Size
3.9MB
-
Sample
240206-pws2vafde2
-
MD5
dd191e98e5c264b5078b13fe38566d7e
-
SHA1
5b8b2c15c9457bfd0ce9ed012c308f245ee6d92d
-
SHA256
9a3990e375cc3a3a9d6c659b5b5551900dcdc1e7fc8f807f85a951517c8ae96f
-
SHA512
72ee9f8fbab5beb5559c993941b1ec03e26ef6f8add89c89206e0283ea141cfa301cbb382fcac2bc4f6b2c9e88f64037f75dbb23f4477508848b8ef25be31289
-
SSDEEP
49152:zLaXnHEdxX+e3FLpgvDn8P7SM4af+QZ2asV:zLIIhGh
Static task
static1
Behavioral task
behavioral1
Sample
document_reader.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
document_reader.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
document_reader.exe
-
Size
3.9MB
-
MD5
dd191e98e5c264b5078b13fe38566d7e
-
SHA1
5b8b2c15c9457bfd0ce9ed012c308f245ee6d92d
-
SHA256
9a3990e375cc3a3a9d6c659b5b5551900dcdc1e7fc8f807f85a951517c8ae96f
-
SHA512
72ee9f8fbab5beb5559c993941b1ec03e26ef6f8add89c89206e0283ea141cfa301cbb382fcac2bc4f6b2c9e88f64037f75dbb23f4477508848b8ef25be31289
-
SSDEEP
49152:zLaXnHEdxX+e3FLpgvDn8P7SM4af+QZ2asV:zLIIhGh
Score10/10-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-