General
-
Target
march19-D7621-2024.xlsx
-
Size
56KB
-
Sample
240319-v6tc9aae8w
-
MD5
78a0e98eb82f8101e07ee8e1217935e1
-
SHA1
0dadb2a6df70848c840c2858b96f4ebead0356fe
-
SHA256
0aae59e8b36fe2bbeb75e177702f3f44682b333fd6c751d355c1e796691fdd8c
-
SHA512
8949b2aad7eeb68f0d32f5f60bb95c9c4bbb6312d279f3ebd4d862e7c9dea02721d18776cb955d6f5d52cfbe16644a5a231203f4749a8bdc355058bce925a191
-
SSDEEP
1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTQ:FSoEOfEgMNdxI5yYhgu5zBRYc
Static task
static1
Behavioral task
behavioral1
Sample
march19-D7621-2024.xlsx
Resource
win7-20231129-en
Malware Config
Extracted
darkgate
admin888
badbutperfect.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WZqqpfdY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
march19-D7621-2024.xlsx
-
Size
56KB
-
MD5
78a0e98eb82f8101e07ee8e1217935e1
-
SHA1
0dadb2a6df70848c840c2858b96f4ebead0356fe
-
SHA256
0aae59e8b36fe2bbeb75e177702f3f44682b333fd6c751d355c1e796691fdd8c
-
SHA512
8949b2aad7eeb68f0d32f5f60bb95c9c4bbb6312d279f3ebd4d862e7c9dea02721d18776cb955d6f5d52cfbe16644a5a231203f4749a8bdc355058bce925a191
-
SSDEEP
1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTQ:FSoEOfEgMNdxI5yYhgu5zBRYc
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-