General
-
Target
27022024_2353_scan.msi
-
Size
5.7MB
-
Sample
240227-tb4p3add8v
-
MD5
50c85e84f91c3b7f1811380aeae9d606
-
SHA1
7703c4ec1ea28c2b9785eb02b5c11b7b226155eb
-
SHA256
ef989e3924e2f9e3fe7ec53fd870124b8f9174275428c36e03a991a55ce5ad54
-
SHA512
e5b2930d2c44d27af969f96b2040045b6a9a6d6ad6cd500a3b01b7b789e713f8bd6dc867a7d6bfc39b87004bfb67744899cb5e94e37bef142aa2f0e21fe7d02c
-
SSDEEP
49152:opUPXXhs0/Te0LjgIAkr5VbSPn9VISBdxXhYHGphbEEoGVupQMKk+/GTeonv3c9M:opEpoVR0mVERDCjk+Onva46G
Static task
static1
Behavioral task
behavioral1
Sample
27022024_2353_scan.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27022024_2353_scan.msi
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkgate
admin888
remasterprodelherskjs.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
kiQRLFmc
-
minimum_disk
50
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
27022024_2353_scan.msi
-
Size
5.7MB
-
MD5
50c85e84f91c3b7f1811380aeae9d606
-
SHA1
7703c4ec1ea28c2b9785eb02b5c11b7b226155eb
-
SHA256
ef989e3924e2f9e3fe7ec53fd870124b8f9174275428c36e03a991a55ce5ad54
-
SHA512
e5b2930d2c44d27af969f96b2040045b6a9a6d6ad6cd500a3b01b7b789e713f8bd6dc867a7d6bfc39b87004bfb67744899cb5e94e37bef142aa2f0e21fe7d02c
-
SSDEEP
49152:opUPXXhs0/Te0LjgIAkr5VbSPn9VISBdxXhYHGphbEEoGVupQMKk+/GTeonv3c9M:opEpoVR0mVERDCjk+Onva46G
Score10/10-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies file permissions
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-