General
-
Target
AZURE_DOC_OPEN.vbs
-
Size
12KB
-
Sample
240320-p7p5bsha54
-
MD5
802e03ffd6498ec9693848197fe4d2e5
-
SHA1
958dfdadcd0f21d801561b94c23b8b3d6e5f4688
-
SHA256
b3a8c88bdd9701a5ca532e0b433944e0992a3ae90e0bb974b2d091b2a01efb94
-
SHA512
06d886eb039d120372a112c1f2c1a399d788800bd6ffc5892dd9e38f6ee4f8c7c2125e654248f2df24016276fedd52c6f7f30146d34a46ccb217b72abcbefb4a
-
SSDEEP
192:oMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nN6UX:Ty19gR3IquNgzG2oNdOdEpeeqlPX
Static task
static1
Behavioral task
behavioral1
Sample
AZURE_DOC_OPEN.vbs
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
AZURE_DOC_OPEN.vbs
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkgate
admin888
badbutperfect.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WZqqpfdY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
AZURE_DOC_OPEN.vbs
-
Size
12KB
-
MD5
802e03ffd6498ec9693848197fe4d2e5
-
SHA1
958dfdadcd0f21d801561b94c23b8b3d6e5f4688
-
SHA256
b3a8c88bdd9701a5ca532e0b433944e0992a3ae90e0bb974b2d091b2a01efb94
-
SHA512
06d886eb039d120372a112c1f2c1a399d788800bd6ffc5892dd9e38f6ee4f8c7c2125e654248f2df24016276fedd52c6f7f30146d34a46ccb217b72abcbefb4a
-
SSDEEP
192:oMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nN6UX:Ty19gR3IquNgzG2oNdOdEpeeqlPX
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-