General
-
Target
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.zip
-
Size
1.9MB
-
Sample
240302-xx69vsgg42
-
MD5
3a5c8302444ae30793b3620481d13011
-
SHA1
9588e5bb07ee351b0dff131eb1d5d96cf69ed370
-
SHA256
cb6e1924f2cf7198f84ba58089625f250772491e5bffcfad68e1f31d9ecbcdc4
-
SHA512
e76fd4bca128d3e32531b570c192c54542d7e1b68fd6d436efe7965fa94fc2c4cf5bb743cc10effdd466a19a674f03903f496bce0f7cc739369ef620727d333b
-
SSDEEP
49152:Qaay5atXaCc+nve/d5/reDsp+z0BdYigQ:QAavveP/rcb7fQ
Static task
static1
Behavioral task
behavioral1
Sample
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.msi
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkgate
admin888
jenb128hiuedfhajduihfa.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
RZymDRsm
-
minimum_disk
100
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Extracted
darkgate
6.1.7
admin888
jenb128hiuedfhajduihfa.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
RZymDRsm
-
minimum_disk
100
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.msi
-
Size
4.3MB
-
MD5
4f238c2093606fc296f1f819c2f0fc67
-
SHA1
f8535858fcee6b96e0f49e6156fa110fc0698880
-
SHA256
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994
-
SHA512
c2422db8871d6303b5903c4b11cca3debd62cb25a406655db5a0ba407f33c9fef739371d297e5ccad45efc99e040e6ae29079b4b9325f52d54c5e780f8c346f7
-
SSDEEP
49152:jpUPN9qhCxzT+WKjSXcmNt6+XzP4BYIeBfCXqyfdo1DDDDDDDDDDPuDgO9hTnxA5:jpqCQbm+jg12f3yaiga6yU
Score10/10-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Scripting
1