General
-
Target
356046c5af6ac3b209ff92daa9d12a549846cdd5556fc20296d4d73384f7a8f6.xlsx
-
Size
56KB
-
Sample
240320-amc7pscc4y
-
MD5
d2c56b42e6814069b4a9e9cb0aa67e00
-
SHA1
11ba553e5d38d1091dc62c528487704d7e239a45
-
SHA256
356046c5af6ac3b209ff92daa9d12a549846cdd5556fc20296d4d73384f7a8f6
-
SHA512
d85a7609c44f297da8f042e9ecfa9b705a547a88d9793152f6be830b83227d9fce5985db3835a82563f99c8b3f21a1655cf6bd2d4904a3bfb6c9d614965e9130
-
SSDEEP
1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTx:FSoEOfEgMNdxI5yYhgu5zBRY1
Static task
static1
Behavioral task
behavioral1
Sample
356046c5af6ac3b209ff92daa9d12a549846cdd5556fc20296d4d73384f7a8f6.xlsx
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
badbutperfect.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WZqqpfdY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
356046c5af6ac3b209ff92daa9d12a549846cdd5556fc20296d4d73384f7a8f6.xlsx
-
Size
56KB
-
MD5
d2c56b42e6814069b4a9e9cb0aa67e00
-
SHA1
11ba553e5d38d1091dc62c528487704d7e239a45
-
SHA256
356046c5af6ac3b209ff92daa9d12a549846cdd5556fc20296d4d73384f7a8f6
-
SHA512
d85a7609c44f297da8f042e9ecfa9b705a547a88d9793152f6be830b83227d9fce5985db3835a82563f99c8b3f21a1655cf6bd2d4904a3bfb6c9d614965e9130
-
SSDEEP
1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTx:FSoEOfEgMNdxI5yYhgu5zBRY1
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-