General
-
Target
749ea9b55273ed8051960ba0aa0a31721a1cd1fecbbb253da3322df745aa40e2.zip
-
Size
1.8MB
-
Sample
240402-l626qaec21
-
MD5
274470fafa419359e6164ed9c598e265
-
SHA1
ad80f6d4f368034e084ba3d8868436f735fcd9ab
-
SHA256
752cba77262a6d90b64495efe6254761034a0539024f1847f8c6c441d8a7144e
-
SHA512
b2610accf35dd00bd62173df8860f62eabaf6f871d60ce87966b71be8b4ab3fff6b0c72cbd14e75ad715be76e171378b7d01b2dd569f2c5e2afe55f3b17c34e5
-
SSDEEP
24576:XBZNk7O+oxNKjaJrrlTEfV/JxbyheTieUZfzmtLBGmKzRmWALX56hDm7xRopN+2s:XB07BoH+aJcaeTieUZr8AzB3G2jIzHx
Static task
static1
Behavioral task
behavioral1
Sample
deckfeauture.msi
Resource
win7-20240220-en
Malware Config
Extracted
darkgate
admin888
strongdomainsercgerhhost.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
false
-
c2_port
443
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
VMKaaNDw
-
minimum_disk
70
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
deckfeauture.msi
-
Size
3.9MB
-
MD5
7fd755d14e74c0af0d1c6b448fea8b5a
-
SHA1
d41b9481f94ca0d5017e6c1eba0086afbeb744a0
-
SHA256
3b953ef40eede72755e5562996fb6854b031440ac535f2f16e86bfdcf1e85132
-
SHA512
14c496cb7db7cd3dd5a44c16a1ba39d82a31ede1c6638c555b085a98728d193bfc4d891c4e5a54b86f9088b15f3812775ff7917413b62f67b80491486ac971b1
-
SSDEEP
49152:BpUPG9qhCxzT+WKjSXNJzLVI42Hdd8PWokdCvmmmmmmmmE/5vfH2xexG8JN6DB:BpLCQNVLe5HXSW55vfHkexGs
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-