General
-
Target
Mazoku.rar
-
Size
7.7MB
-
Sample
240327-q4256add72
-
MD5
562a55490f4719dbd30afce441f8a4fd
-
SHA1
ad524094f13ef4942dd77ca3ab3b693d57ae3292
-
SHA256
0548b90912c147102750c6b6e84504fa8f37f7143c288131a6e00793646024bc
-
SHA512
18cfb09c0978d6830980dc977b620d27e0f8f28c0ed32ec2db08a9a457c37553a5d33654cf7a458edd35ae66100fde129caf361f2b5d3d8d9c60acd6d09a97e4
-
SSDEEP
196608:w3QZXDD8kTaGTkpnwvH9IzFvW7sZhi442i3o/bc3K2Z+4ZtDVgU:wO8kuGTcnWdINW7ihiHsY3rL7Bh
Static task
static1
Behavioral task
behavioral1
Sample
#DarkGate/AutoHotkey.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
#DarkGate/AutoHotkey.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
#Vidar/Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
#Vidar/Setup.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkgate
admin888
badbutperfect.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WZqqpfdY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Extracted
vidar
9e23613691aee9405b5fb64671c7c70e
https://pvasms.top
https://steamcommunity.com/profiles/76561199658817715
https://t.me/sa9ok
-
profile_id_v2
9e23613691aee9405b5fb64671c7c70e
-
user_agent
Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/8.0.500.0 Safari/534.6
Targets
-
-
Target
#DarkGate/AutoHotkey.exe
-
Size
892KB
-
MD5
a59a2d3e5dda7aca6ec879263aa42fd3
-
SHA1
312d496ec90eb30d5319307d47bfef602b6b8c6c
-
SHA256
897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb
-
SHA512
852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030
-
SSDEEP
24576:bGzl9+a4Ne1nEFI56xU+0IdY2Zv952uetfbFEzP4UFhOt:b+tOWnEFZR0El0JEzQAh
-
Detect DarkGate stealer
-
-
-
Target
#Vidar/Setup.exe
-
Size
7.3MB
-
MD5
49b6bce6cd0111433969c39a62635f91
-
SHA1
0e34b4e770cc7d018b955bc14dabb205321e872c
-
SHA256
29345d9c6ff0106c9032b15e2c88f17bc8972ed843d1b5c044cf17d00f1d45c5
-
SHA512
4737663a5a6b30779650dcaa461b7751bfb735d2c906d04d877604db5a270f68205e0ff1240f2509f2835d885708b849759b10d22deff3bf0f03579bd1402ff8
-
SSDEEP
49152:/Ph7SQtfhuOhfEPOBjP9P6SOgjha5VKnRt3RQ9Wpvgt4sbVpEmVT1oG3vTROBYxI:ntBbz3q9QluER
Score10/10-
Detect Vidar Stealer
-
Suspicious use of SetThreadContext
-