General
-
Target
ACH-9391-15March.xlsx
-
Size
48KB
-
Sample
240315-vksvladf4v
-
MD5
56c3eefce2dbae121b56989d24ca7d8d
-
SHA1
21b2a5c4f22094b3318f1a2314beb7ba8b4763a9
-
SHA256
5f5953aadd3335ec4ff5190f4bc23d41e858c236d4102ade128650869a60cb70
-
SHA512
c465974add9255ac4c5cb65cf38e25897a124a146b7e4ed209df95328622296b3d673edab3a32020861081bbf90f556cc7e3856b9247a1fc9fa8781da6292a21
-
SSDEEP
768:ZFlppbq6i4Y/TJC4xJMxXcvFLwAPq4Sxv9PvEgzegYN1T/m:tLq94YV7JMxXyd4x+gzexTO
Static task
static1
Behavioral task
behavioral1
Sample
ACH-9391-15March.xlsx
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
diveupdown.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
VfiPBBhr
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
ACH-9391-15March.xlsx
-
Size
48KB
-
MD5
56c3eefce2dbae121b56989d24ca7d8d
-
SHA1
21b2a5c4f22094b3318f1a2314beb7ba8b4763a9
-
SHA256
5f5953aadd3335ec4ff5190f4bc23d41e858c236d4102ade128650869a60cb70
-
SHA512
c465974add9255ac4c5cb65cf38e25897a124a146b7e4ed209df95328622296b3d673edab3a32020861081bbf90f556cc7e3856b9247a1fc9fa8781da6292a21
-
SSDEEP
768:ZFlppbq6i4Y/TJC4xJMxXcvFLwAPq4Sxv9PvEgzegYN1T/m:tLq94YV7JMxXyd4x+gzexTO
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-