General
-
Target
code.ps1
-
Size
361B
-
Sample
240320-s1zxqsbh33
-
MD5
f8cb37494289ba5295e427425173cdf9
-
SHA1
e76bfbd7d7024ed22267e49ca00772cd94f3fb3e
-
SHA256
81ef36dd2326e8317679398184af16cf959f43921acfacc5923733e45c76832d
-
SHA512
26df5131addf9047820725f1aef8bcbd8213ea0521b91245d1b595f8b54846791606976a91cf5f87aab9455f56320ca708e84bd101c4adb7667e092dc45b7fbe
Static task
static1
Behavioral task
behavioral1
Sample
code.ps1
Resource
win10-20240319-en
Malware Config
Extracted
darkgate
admin888
badbutperfect.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WZqqpfdY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
code.ps1
-
Size
361B
-
MD5
f8cb37494289ba5295e427425173cdf9
-
SHA1
e76bfbd7d7024ed22267e49ca00772cd94f3fb3e
-
SHA256
81ef36dd2326e8317679398184af16cf959f43921acfacc5923733e45c76832d
-
SHA512
26df5131addf9047820725f1aef8bcbd8213ea0521b91245d1b595f8b54846791606976a91cf5f87aab9455f56320ca708e84bd101c4adb7667e092dc45b7fbe
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-