General
-
Target
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.zip
-
Size
2.2MB
-
Sample
240302-xx84fsgc5t
-
MD5
d9e0d94a55b67ebf04f9bbe43501dc3c
-
SHA1
2f5b9dcd47c142a1a637797db765063f23ad69a7
-
SHA256
c91c370b2295950cf025299aafced7f60db77e9379461d0080bf768182084f7b
-
SHA512
4e4efcc493e2f355e2b29e634eeec7c6579da4454457d0d740e9fd15cdeabe1df86d4c3f8812043fbd3b7cdcea46f87057224dc59de905303a7f98343e0de0bb
-
SSDEEP
49152:0OqFDSkdU4zIssI6EKhPzbcEhCtjdnOwbDBd/GApC9H:8Ske4zILI6hfdEdOSdQ9H
Static task
static1
Behavioral task
behavioral1
Sample
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
stachmentsuprimeresult.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
443
-
check_disk
false
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
veVumtze
-
minimum_disk
30
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi
-
Size
4.3MB
-
MD5
b88352bde539f79207be209759505f02
-
SHA1
8ede7ee0a43c4282b41687408ddc38a243ac4bfd
-
SHA256
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112
-
SHA512
104d4330c05e41d2039a0b61438565c88138ec9b2c55632ab0ec8eaf70840b095e1dd5bb5d55b65373099df80896632499ff5b3c85240d7a389824cb72268921
-
SSDEEP
49152:zpUPB9qhCxzT+WKjSX15zLVI4vLeY9xV4qtGvmKBteU5oBgffUBS88qAU8:zpECQ1FLeYLVTV4WMVf
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-