General
-
Target
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.zip
-
Size
1.8MB
-
Sample
240302-xx6nbsgg38
-
MD5
f1864bdbd733ddeb77a65e81879c3918
-
SHA1
e0f2ab339eabb0a5a07c7f8f291e0fe1340afb4a
-
SHA256
627152040209e8523042ad8556c8fe501724f354e56b32e68e5632037a064af2
-
SHA512
dab995b76ebc1fd616b91859c49216706b683063f284fa2ccb50cc03eca731356c3783ab6df170fb180d4293ddf1327adfb0b58579aa76e6b764bf41010436f9
-
SSDEEP
49152:Kp1KkL5qOLuRvKc1mSsSPopfpzXiaAcBNac7Ynva59w:w9DEVJeuaCj8w
Static task
static1
Behavioral task
behavioral1
Sample
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
rourtmanjsdadhfakja.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
eXAWVDek
-
minimum_disk
50
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
-
Size
3.9MB
-
MD5
54c2f6b177e71ec4c262930566a282d1
-
SHA1
b39e90c76e1fb6e4dc6f2d4ed034ba7b9c82bf23
-
SHA256
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848
-
SHA512
7b84d5784626707e808bc7a8e0b15fb23f7faf3dc77e3aa720a18e89e494c98850b1b6de52b25f43463e5a39aac2db1edebbd6c891976d89facd1f775cf16e43
-
SSDEEP
49152:0pUPBhGczyqOSKGLcLxxYuYLRlJ7lzkiBVlR3/BzuAPeJx3B+JLil:0pUqM9LDEKXVuAPMuW
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-