General
-
Target
scan-28-02-24_8533.xlsx
-
Size
29KB
-
Sample
240228-xxbg7abf71
-
MD5
40aaf96cca181e21db1cf6285ac3288e
-
SHA1
7dbb59fe9600785a8d56590a5472e6a247f67a02
-
SHA256
2a9095ba227ab3f6903767fb5e996e3f56eb141472d12fd28eb7b7028074be6f
-
SHA512
051a26edd4645bdeaa907dc4b36a15997f8f4e8cedb171fa906ff33a0c55eca69a60d4f819d4fb85ad63d3728c18e39c43a8a79a9a48b593ce6737915c00b6d2
-
SSDEEP
768:wnEQpllh7tAafroiianGoHoJ+yWWn0WhtFK3:nQJh7Lro4ntD+0A03
Static task
static1
Behavioral task
behavioral1
Sample
scan-28-02-24_8533.xlsx
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
cayennesxque.boo
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
true
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
ekoRFSqn
-
minimum_disk
50
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
scan-28-02-24_8533.xlsx
-
Size
29KB
-
MD5
40aaf96cca181e21db1cf6285ac3288e
-
SHA1
7dbb59fe9600785a8d56590a5472e6a247f67a02
-
SHA256
2a9095ba227ab3f6903767fb5e996e3f56eb141472d12fd28eb7b7028074be6f
-
SHA512
051a26edd4645bdeaa907dc4b36a15997f8f4e8cedb171fa906ff33a0c55eca69a60d4f819d4fb85ad63d3728c18e39c43a8a79a9a48b593ce6737915c00b6d2
-
SSDEEP
768:wnEQpllh7tAafroiianGoHoJ+yWWn0WhtFK3:nQJh7Lro4ntD+0A03
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-