General
-
Target
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.zip
-
Size
1.8MB
-
Sample
240402-l61b5aec2t
-
MD5
b4641cf07bb110e22617fdeda449e910
-
SHA1
82ab23695b43b9084f73d01e301050a0b1b108e4
-
SHA256
36cb52e2db156167010040ddc1dfd5a9385425c88b71d0086199b47acdd7d075
-
SHA512
96f03e6de992ec3ab130c994fba955ef493894ea78830f4c9edc5fe8a980c3f0bd1f55b9d8bb1f9c83acfdc539387df7675b15c5e1b6816329ff68c077468fe8
-
SSDEEP
49152:hCcfA0REujt3lVHa//h9zRHZN+HcCPcNusjzMcFXne:HYB0lMnTzDNR8c4sj4IXne
Static task
static1
Behavioral task
behavioral1
Sample
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkgate
admin888
rourtmanjsdadhfakja.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
eXAWVDek
-
minimum_disk
50
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
-
Size
3.9MB
-
MD5
54c2f6b177e71ec4c262930566a282d1
-
SHA1
b39e90c76e1fb6e4dc6f2d4ed034ba7b9c82bf23
-
SHA256
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848
-
SHA512
7b84d5784626707e808bc7a8e0b15fb23f7faf3dc77e3aa720a18e89e494c98850b1b6de52b25f43463e5a39aac2db1edebbd6c891976d89facd1f775cf16e43
-
SSDEEP
49152:0pUPBhGczyqOSKGLcLxxYuYLRlJ7lzkiBVlR3/BzuAPeJx3B+JLil:0pUqM9LDEKXVuAPMuW
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-