General
-
Target
MICROSOFT_OFFICE_EXCEL_A.vbs
-
Size
12KB
-
Sample
240325-zqb69acb4z
-
MD5
bbaded0a8091b76257dc4880c9ef59dc
-
SHA1
ecae806439418202758a1011005f726a57399032
-
SHA256
2d960acdda45cd77a0590c6f652d8496eba30e1b2b263f6a083ac5b27512d1c6
-
SHA512
4ca8b46fa3ddcf4dfd370619da65dd96a00127618828016b833d8f94f6ca5c13981160b1abf389995c14a7d700ee2d3d1a08c8199c68153265619e8684c7b41c
-
SSDEEP
192:QMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nNX:Ly19gR3IquNgzG2oNdOdEpeeqlPt
Static task
static1
Behavioral task
behavioral1
Sample
MICROSOFT_OFFICE_EXCEL_A.vbs
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
goingupdate.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
BCaKNSck
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
MICROSOFT_OFFICE_EXCEL_A.vbs
-
Size
12KB
-
MD5
bbaded0a8091b76257dc4880c9ef59dc
-
SHA1
ecae806439418202758a1011005f726a57399032
-
SHA256
2d960acdda45cd77a0590c6f652d8496eba30e1b2b263f6a083ac5b27512d1c6
-
SHA512
4ca8b46fa3ddcf4dfd370619da65dd96a00127618828016b833d8f94f6ca5c13981160b1abf389995c14a7d700ee2d3d1a08c8199c68153265619e8684c7b41c
-
SSDEEP
192:QMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nNX:Ly19gR3IquNgzG2oNdOdEpeeqlPt
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-