Behavioral task
behavioral1
Sample
e5ba85d1a6a54df38b5fa655703c3457783f4a4f71e178f83d8aac878d4847da.exe
Resource
win7-20231215-en
General
-
Target
e5ba85d1a6a54df38b5fa655703c3457783f4a4f71e178f83d8aac878d4847da.exe
-
Size
429KB
-
MD5
f7db18466e1582672793d7e2d9a408be
-
SHA1
5a6c003f48175bc73d67dc368381f926b7a54465
-
SHA256
e5ba85d1a6a54df38b5fa655703c3457783f4a4f71e178f83d8aac878d4847da
-
SHA512
efba37fe3cd5aece8eb41a88d74bd40f2546d1656a22d2183aa0e7b66106eb0697f5ae32ecd9438b82c8c5b046f611393e883d3680d5dcb2659d0ddf9639e419
-
SSDEEP
12288:wCmg8nX4Mng/PkN5GGFVXT5osTk8NSH9:wC/3Mng/PkN5GAttBR0
Malware Config
Signatures
-
Darkgate family
-
Detect DarkGate stealer 1 IoCs
resource yara_rule sample family_darkgate_v6 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e5ba85d1a6a54df38b5fa655703c3457783f4a4f71e178f83d8aac878d4847da.exe
Files
-
e5ba85d1a6a54df38b5fa655703c3457783f4a4f71e178f83d8aac878d4847da.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 368KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 12B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ