General
-
Target
report-(721490)-2024.html
-
Size
3KB
-
Sample
240327-zxtd4sfc6y
-
MD5
d6207a7c2d321188c004d77baacabba7
-
SHA1
0772674e0b4ed9a45d617e9c84dde1f76dfb9375
-
SHA256
280b45fb30ca137e582f5147af08ff310034aa9b368299e76c180b65ad81b93c
-
SHA512
080c587158ff0fe2bc687e31b1d613ca7dd38338ec82db40a0004ca2415993cf01eff548e0fdef53bb6c253ad2284e6f208df6c9987eafce60d0233925e02c6b
Static task
static1
Behavioral task
behavioral1
Sample
report-(721490)-2024.html
Resource
win7-20240220-en
Malware Config
Extracted
darkgate
admin888
withupdate.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
VqunyHFY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
report-(721490)-2024.html
-
Size
3KB
-
MD5
d6207a7c2d321188c004d77baacabba7
-
SHA1
0772674e0b4ed9a45d617e9c84dde1f76dfb9375
-
SHA256
280b45fb30ca137e582f5147af08ff310034aa9b368299e76c180b65ad81b93c
-
SHA512
080c587158ff0fe2bc687e31b1d613ca7dd38338ec82db40a0004ca2415993cf01eff548e0fdef53bb6c253ad2284e6f208df6c9987eafce60d0233925e02c6b
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-