Analysis
-
max time kernel
98s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
dark_drop.exe
Resource
win10v2004-20240226-en
General
-
Target
dark_drop.exe
-
Size
1.4MB
-
MD5
d6dde64d64bef5cebbc75e4b19704f88
-
SHA1
b8081ae07380af61e6562ca6dba12dc98b9c06f6
-
SHA256
bff6c1cc7b3b8e6b206390d9e7053defa98e20915793dd3989c6df0de3fa5252
-
SHA512
aa079e4cf0a46a04389d5c174bc24e995f5398e5ccc4088ccda00a3a3657e536ce86a3fbf365f8758c0eb81e0db4f3344447e377380d5a29ca2a17d59c84d6b9
-
SSDEEP
24576:GYT3E53Myyzl0hMf1tr7Caw8M09KW6AAUGIMVJ5/s:G23EZpBh211Waw309+UGIsT/
Malware Config
Extracted
darkgate
kaitoshiba123
45.63.52.184
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
8094
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
bpEgCXsp
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
kaitoshiba123
Signatures
-
Detect DarkGate stealer 2 IoCs
resource yara_rule behavioral1/memory/2972-11-0x0000000005AA0000-0x0000000005E2A000-memory.dmp family_darkgate_v6 behavioral1/memory/2972-12-0x0000000005AA0000-0x0000000005E2A000-memory.dmp family_darkgate_v6 -
Executes dropped EXE 1 IoCs
pid Process 2972 Autoit3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4224 wrote to memory of 2972 4224 dark_drop.exe 84 PID 4224 wrote to memory of 2972 4224 dark_drop.exe 84 PID 4224 wrote to memory of 2972 4224 dark_drop.exe 84
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
501KB
MD5280c8a6fe09f38a8bee8a0efbc5f04b8
SHA166b72bd6138d8e1a5b987d0f6985241ac1ca04fa
SHA256e86b02bf58374405971ffdbe260586eeeed56ff5522ffe0fdcc179b5b8e94e71
SHA512d619fc6647fc5853e2960cd3c115a4d941c344b027068593a919b01bd681e7caa0418f9c78041736286947f9cb97ee36bc7b19220903cf10a6431ad0b72ae437
-
Filesize
76B
MD51d4125c8f8baf4970a5f45ff399a1eed
SHA1d373c9177472a67aeda3c6340f7b09154ca987a2
SHA25602ce2c3706b4bfe2f2c595686c969b4e0003522ff0c11812406557bbd3891287
SHA5127d2d046dc7a57384206fa794f8b4ab51169bfd8683b7fa23079c511b59160ab9266478bd9010f817d8c66a88ac427ef3dca11e0fb8e42a4726e8acd21c72b17c