Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 00:13
Behavioral task
behavioral1
Sample
26032024_0813_drkgate_2503.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
26032024_0813_drkgate_2503.exe
-
Size
452KB
-
MD5
8a50fabafe78e37d28b30ffe7b8d3f98
-
SHA1
bf4224ba733f6f5a354869600e9d1352978d9b5b
-
SHA256
a4c7584c85cb62c533b09c6efb6e67c71c995eb220364ab947051da20e74db9a
-
SHA512
dfcdc382db3cb7c2d9e41de6382b83aa026e9c1191eb2a39480febcd4fe9d52777c43739e58669488a3a729b024479438aedf9144c19b265836e08bdf990ad3f
-
SSDEEP
6144:tnqtNwXtF9sSDTIITlWoIqKIkg9IDXJi7usWkm/pbyoaNnW5Wva1Epkvy9/:otNyt3NTlNIqPkg9IDX+C3GW06Epka9
Malware Config
Extracted
Family
darkgate
Botnet
admin888
C2
goingupdate.com
Attributes
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
BCaKNSck
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 1 IoCs
resource yara_rule behavioral1/memory/1888-1-0x0000000000400000-0x0000000000471000-memory.dmp family_darkgate_v6 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 26032024_0813_drkgate_2503.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 26032024_0813_drkgate_2503.exe