General
-
Target
march.html
-
Size
3KB
-
Sample
240325-tx8wxacg93
-
MD5
92510eff30850b413b1142df4fbaa06b
-
SHA1
762cb216fb170574de41e71576fef0780a90092c
-
SHA256
6e72e76d60990669b323f976897820f4341d0bf8fe7744f69f71ca11a0b2226b
-
SHA512
799fb0c82143481253fbbc607253bb29d467be9bc0b469f3ff55ae40845d14fd16b20b1cf02cf7a15a0848edd1279f7f5c101a0fd5e1755263f01281ada30aab
Static task
static1
Malware Config
Extracted
darkgate
admin888
goingupdate.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
kQwvJqoB
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
march.html
-
Size
3KB
-
MD5
92510eff30850b413b1142df4fbaa06b
-
SHA1
762cb216fb170574de41e71576fef0780a90092c
-
SHA256
6e72e76d60990669b323f976897820f4341d0bf8fe7744f69f71ca11a0b2226b
-
SHA512
799fb0c82143481253fbbc607253bb29d467be9bc0b469f3ff55ae40845d14fd16b20b1cf02cf7a15a0848edd1279f7f5c101a0fd5e1755263f01281ada30aab
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Executes dropped EXE
-