General
-
Target
2a4b987fdbd42a6a5cfbfdc334ce634f.bin
-
Size
1KB
-
Sample
240328-bhytaaab23
-
MD5
a338511bd6ca0aff81858e39f345e66f
-
SHA1
7cb41ce7d8594e0c155b0d3df23c1c5ab1143cec
-
SHA256
3fbea74afb2d9d97c82f47589615754b87d5efaed51217422fc86cab2bddca27
-
SHA512
cf1c4ef39ceada09ba58a8e7173ad1416ab0b0a65d3c7d20a8f4b171d0149b7b94f688d14eb28017c5eb86039287a070b48816bc1f65885069357faab95c17cd
Static task
static1
Behavioral task
behavioral1
Sample
cb65d95a1496fd2e5105954eb3046df90c4262f19fa7d7d77fa59b488348b040.vbs
Resource
win7-20231129-en
Malware Config
Extracted
darkgate
admin888
backupitfirst.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
SfUQxDje
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
cb65d95a1496fd2e5105954eb3046df90c4262f19fa7d7d77fa59b488348b040.vbs
-
Size
6KB
-
MD5
2a4b987fdbd42a6a5cfbfdc334ce634f
-
SHA1
9964d7287bb64f36231b751eb80608176fc8b687
-
SHA256
cb65d95a1496fd2e5105954eb3046df90c4262f19fa7d7d77fa59b488348b040
-
SHA512
4aabaf92a6bf309869ee2ab6eabb9081bb4b5fc57362d9b343fdc7e8eb010ef66512aa5e80056cdb9501f0602d413d325ccc81f1cff3ebe7756167d163d09b80
-
SSDEEP
192:QMg119gkCtL3IqSPN3QzGNzUoNK9V4nN9:Ly19gR3IquNgzG2oN7r
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-