General
-
Target
de69281050c18627c8e75a3f4cdf933db77ace2a8dd13ef753f61ad6e0a405ad.zip
-
Size
1.6MB
-
Sample
240302-xx8spagg47
-
MD5
8a178ceca36f62352f67490fdf1cf5bb
-
SHA1
136a41b6f4a77ea556286c98232284bfb04e5bd6
-
SHA256
cb6631977fd57aea2c49e62263131b3e20a071495ad63adb3363ca6fd0d3184a
-
SHA512
d4d8eb8df06d6955b3df88d526a619c0a53487c9ee686d1fd05e1aa78ea12b641be0ddb7a86ad160f6f1de57607aeeea6725245325fa54f90d4c4096a9f738e8
-
SSDEEP
49152:TavR6D8yFNImN7oTij6BgtYWEqcrtl/bb+XzY6QtStAZGkzq:mpg8kI07o+j6abEp/eVcB0
Static task
static1
Behavioral task
behavioral1
Sample
de69281050c18627c8e75a3f4cdf933db77ace2a8dd13ef753f61ad6e0a405ad.msi
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
de69281050c18627c8e75a3f4cdf933db77ace2a8dd13ef753f61ad6e0a405ad.msi
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkgate
admin888
pjnbadfjandkadm3kd.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
wVImrJRl
-
minimum_disk
100
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Extracted
darkgate
6.1.7
admin888
pjnbadfjandkadm3kd.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
wVImrJRl
-
minimum_disk
100
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
de69281050c18627c8e75a3f4cdf933db77ace2a8dd13ef753f61ad6e0a405ad.msi
-
Size
3.2MB
-
MD5
6922c8d97e6d60135a3c55302ce1eecf
-
SHA1
f3714edb96b5db59b392058292ed486dfd3d3629
-
SHA256
de69281050c18627c8e75a3f4cdf933db77ace2a8dd13ef753f61ad6e0a405ad
-
SHA512
2477b8432ffd9a0873608d978b30a8eea129d6180a18437a3a204c875ec2469e4eb0db2a6c52b6d2bb3e1881fcb0e1e29934d73608499694545cfdda5bf53494
-
SSDEEP
49152:qpUPqczdMZnZajVw8XsmOL8ruQO7/rsGQNTRJD+jQW/XRaWEr1bCU:qpmBUZaZw8u8rJOjrsG2apKGU
Score10/10-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Scripting
1