General
-
Target
27032024_0037_Report-26-2024.vbs
-
Size
12KB
-
Sample
240326-t4z8cahd7z
-
MD5
b371387b0b5551c936c94bdf36c2e2f5
-
SHA1
2f40590d998688bd681ea0afcea615b6a348cb31
-
SHA256
038db3b838d0cd437fa530c001c9913a1320d1d7ac0fd3b35d974a806735c907
-
SHA512
2c31bc7357c6b87b85cf44cedb9b864c6050544707a0f053121833ce677b99fa1094b2850b4ac73520e31b4804830d39f96ae506ae57f4fa7c49e9f04317b057
-
SSDEEP
192:QMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nN/Z/:Ly19gR3IquNgzG2oNdOdEpeeqlPxd
Static task
static1
Behavioral task
behavioral1
Sample
27032024_0037_Report-26-2024.vbs
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
withupdate.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
VqunyHFY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
27032024_0037_Report-26-2024.vbs
-
Size
12KB
-
MD5
b371387b0b5551c936c94bdf36c2e2f5
-
SHA1
2f40590d998688bd681ea0afcea615b6a348cb31
-
SHA256
038db3b838d0cd437fa530c001c9913a1320d1d7ac0fd3b35d974a806735c907
-
SHA512
2c31bc7357c6b87b85cf44cedb9b864c6050544707a0f053121833ce677b99fa1094b2850b4ac73520e31b4804830d39f96ae506ae57f4fa7c49e9f04317b057
-
SSDEEP
192:QMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nN/Z/:Ly19gR3IquNgzG2oNdOdEpeeqlPxd
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-