Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 16:32
General
-
Target
fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe
-
Size
423KB
-
MD5
3c609ac6b2de29578a2383d71e12caa9
-
SHA1
bb0061eca413d4fe67e6b9a7aa281f0aaea3c8b2
-
SHA256
fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241
-
SHA512
0475c274c0e0541cae744342d339f03f49bfd2e0f820ec89b1432cdeee9ab17e2c956acfc431691bd04cebd381916284cd0c3fa2e9275a1c34afff92cdec0784
-
SSDEEP
6144:6KaDxUgUvVcmX+IosmZepDouQBYwZE/pfGx0oagug/Jyb1F5S7NGNh/:XUxGcmXPosmZepUuQBYFTgBsF5o2
Malware Config
Extracted
Family
darkgate
Version
6.1.7
Botnet
admin888
C2
stachmentsuprimeresult.com
Attributes
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
443
-
check_disk
false
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
bIlTdjHV
-
minimum_disk
29
-
minimum_ram
6050
-
ping_interval
6
-
rootkit
false
-
startup_persistence
false
-
username
admin888
Signatures
-
Detect DarkGate stealer 14 IoCs
resource yara_rule behavioral1/memory/876-1-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-2-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-3-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-4-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-5-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-6-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-7-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-8-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-9-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-10-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-11-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-12-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-13-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 behavioral1/memory/876-14-0x0000000000400000-0x0000000000470000-memory.dmp family_darkgate_v6 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 876 fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe 876 fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 876 fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe"C:\Users\Admin\AppData\Local\Temp\fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:876