General
-
Target
ESAREA-ngoowrejjdebusx-1710889917.xlsx
-
Size
56KB
-
Sample
240320-p46ynsha22
-
MD5
e561b5787c53f30780f0253e72fc87ea
-
SHA1
25c17311027b20774c96e16fd0557c1899ca8c1a
-
SHA256
60332509742968a19b12375d995fa5f9c695962c08f7df4fe0dc1ef83fbdcfea
-
SHA512
484cd13d83295a1d4c203e41cf6c2bd577683fef6872b7c317de7cdef096023bf39267474803189495cb22c7b824113101e1c4ad26d9ec79e5cc8776b1737357
-
SSDEEP
1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTo:FSoEOfEgMNdxI5yYhgu5zBRY0
Static task
static1
Behavioral task
behavioral1
Sample
ESAREA-ngoowrejjdebusx-1710889917.xlsx
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
ESAREA-ngoowrejjdebusx-1710889917.xlsx
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ESAREA-ngoowrejjdebusx-1710889917.xlsx
Resource
win11-20240221-en
Malware Config
Extracted
darkgate
admin888
badbutperfect.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WZqqpfdY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
ESAREA-ngoowrejjdebusx-1710889917.xlsx
-
Size
56KB
-
MD5
e561b5787c53f30780f0253e72fc87ea
-
SHA1
25c17311027b20774c96e16fd0557c1899ca8c1a
-
SHA256
60332509742968a19b12375d995fa5f9c695962c08f7df4fe0dc1ef83fbdcfea
-
SHA512
484cd13d83295a1d4c203e41cf6c2bd577683fef6872b7c317de7cdef096023bf39267474803189495cb22c7b824113101e1c4ad26d9ec79e5cc8776b1737357
-
SSDEEP
1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTo:FSoEOfEgMNdxI5yYhgu5zBRY0
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-