General
-
Target
new_13.txt
-
Size
599B
-
Sample
240325-vh137ade62
-
MD5
33186abd8e55b840e1f42e67f98bfb61
-
SHA1
94c7819749e116bcf96303783e08d73ee6160a19
-
SHA256
c96eb2b8f524b2be4e1801445e7f5e542d34cd7033482560712b12d76ea69da9
-
SHA512
5e375d29e01d84b96c2335dc90b198a9a6902d580e4b8a353ae42d5068454d161f5f85eda787e9efe8b793811660403accf8899b19681bb1683c959c3afd0ec0
Static task
static1
Malware Config
Extracted
darkgate
admin888
goingupdate.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
kQwvJqoB
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
new_13.txt
-
Size
599B
-
MD5
33186abd8e55b840e1f42e67f98bfb61
-
SHA1
94c7819749e116bcf96303783e08d73ee6160a19
-
SHA256
c96eb2b8f524b2be4e1801445e7f5e542d34cd7033482560712b12d76ea69da9
-
SHA512
5e375d29e01d84b96c2335dc90b198a9a6902d580e4b8a353ae42d5068454d161f5f85eda787e9efe8b793811660403accf8899b19681bb1683c959c3afd0ec0
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Executes dropped EXE
-