General
-
Target
roamingkiller.msi
-
Size
4.0MB
-
Sample
240326-v2qfssae5s
-
MD5
986f09656e4864f9731312b0343df116
-
SHA1
c83264f9d18f45359a3c31822a35eeea24218e0e
-
SHA256
8738866be2f39ac05df243bbe2c82dfc6c125643cc5c75e5f199701fbacc90c9
-
SHA512
61c92dee7d1d26738f4fb447d5272b85f7b82aa7e15ace3bedc815d0542477435c7b33a517362fa70db70d09d4d55cb538413f7c22820dd8db46cbd80d271b73
-
SSDEEP
49152:apUPV9qhCxzT+WKjSX1dzLVI4QNhhg7HAS35gqffIn2VvsOUxNUP/YN6bhvqIis:apECQ15Le07H1WqHF9jUvUP/YE1v
Static task
static1
Behavioral task
behavioral1
Sample
roamingkiller.msi
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
strongdomainsercgerhhost.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
false
-
c2_port
443
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
oMCbXETF
-
minimum_disk
70
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
roamingkiller.msi
-
Size
4.0MB
-
MD5
986f09656e4864f9731312b0343df116
-
SHA1
c83264f9d18f45359a3c31822a35eeea24218e0e
-
SHA256
8738866be2f39ac05df243bbe2c82dfc6c125643cc5c75e5f199701fbacc90c9
-
SHA512
61c92dee7d1d26738f4fb447d5272b85f7b82aa7e15ace3bedc815d0542477435c7b33a517362fa70db70d09d4d55cb538413f7c22820dd8db46cbd80d271b73
-
SSDEEP
49152:apUPV9qhCxzT+WKjSX1dzLVI4QNhhg7HAS35gqffIn2VvsOUxNUP/YN6bhvqIis:apECQ15Le07H1WqHF9jUvUP/YE1v
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-