Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 02:00
Behavioral task
behavioral1
Sample
15032024_1000_drkgate_1403.exe
Resource
win7-20240220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
15032024_1000_drkgate_1403.exe
-
Size
452KB
-
MD5
5acc8f4e5baddb6804a0ec566fe3574f
-
SHA1
e99ea46e95868f8f5a1134f6d64f9f8652a15dd3
-
SHA256
2463dc75e435c7f0f0b13c55aa7870d1c2ab56378d334261a9a913685bacdd53
-
SHA512
b1ca3f140ea184a2baf9c32372f8ac7f9e6576c4b1be38a5f8a32de7d50f08bd5912f38f39c1d284f1f7783f87a8a087b4b2285ce063f49b80e3ea0845214303
-
SSDEEP
12288:FtkKpKF2q1F3WbaPio/TKvJzghvOXK7BOw:FtZA1F3WbaPio/OvJ09VU
Malware Config
Extracted
Family
darkgate
Botnet
admin888
C2
nextroundst.com
Attributes
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
NeONIafa
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 1 IoCs
resource yara_rule behavioral1/memory/1660-1-0x0000000000400000-0x0000000000471000-memory.dmp family_darkgate_v6 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 15032024_1000_drkgate_1403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 15032024_1000_drkgate_1403.exe