Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 18:29
Behavioral task
behavioral1
Sample
16032024_0229_drkgate_1503.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
16032024_0229_drkgate_1503.exe
-
Size
452KB
-
MD5
3869b13da90445162c8ab493699078a6
-
SHA1
6f13173170d1050fd28a1cae37834e57733164de
-
SHA256
d68de20c720427d99aa6ac253402c66ae9904fb667956c98ab9e36fe34a59635
-
SHA512
718b862eb95cd2ffa1c33900339503bb98d552ff30fbc34080bb81662c9a94b2f6cff91e149308173d1bac87f47671cc8c4b33af37b2d27f218d3ad241d3975b
-
SSDEEP
12288:FtkKpKF2q1F3WbaPio/TKvJzghvOXK7BO/:FtZA1F3WbaPio/OvJ09VU
Malware Config
Extracted
Family
darkgate
Botnet
admin888
C2
diveupdown.com
Attributes
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
VfiPBBhr
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 1 IoCs
resource yara_rule behavioral2/memory/4516-1-0x0000000000400000-0x0000000000471000-memory.dmp family_darkgate_v6 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 16032024_0229_drkgate_1503.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 16032024_0229_drkgate_1503.exe