General
-
Target
a31ac963ee344678ec4386bdac3a9c9cf2804049cb81e5b0daeb65082da09b32.zip
-
Size
1.9MB
-
Sample
240402-l64pjsec3w
-
MD5
4b202a6423fffd66ada6431fbfb22fac
-
SHA1
7597c5f31760c926ef16dfc231cab3b62fe364bd
-
SHA256
d9b23ee41e905264e77a813a9c9386cb7bb1ead10c3df4513a818df1f42e96eb
-
SHA512
4f6e36e082ffdaaccb7cb7219f8f4154113244091bb4111e2e2eadc25ac6265c07c109f64103e25148c298d9241db9fcd1aeaede2d22b5b5ed91302271744a59
-
SSDEEP
49152:F9v+A3WnqY/3UtxSzs3z8pLYYFImmt/Q9asoX8JFD+f45z/zdHe:FB4ktYbLNGYDos1z/h+
Static task
static1
Behavioral task
behavioral1
Sample
mkreafr.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
mkreafr.msi
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkgate
admin888
jenb128hiuedfhajduihfa.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
RZymDRsm
-
minimum_disk
100
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Extracted
darkgate
6.1.7
admin888
jenb128hiuedfhajduihfa.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
RZymDRsm
-
minimum_disk
100
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
mkreafr.msi
-
Size
4.3MB
-
MD5
4f238c2093606fc296f1f819c2f0fc67
-
SHA1
f8535858fcee6b96e0f49e6156fa110fc0698880
-
SHA256
58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994
-
SHA512
c2422db8871d6303b5903c4b11cca3debd62cb25a406655db5a0ba407f33c9fef739371d297e5ccad45efc99e040e6ae29079b4b9325f52d54c5e780f8c346f7
-
SSDEEP
49152:jpUPN9qhCxzT+WKjSXcmNt6+XzP4BYIeBfCXqyfdo1DDDDDDDDDDPuDgO9hTnxA5:jpqCQbm+jg12f3yaiga6yU
Score10/10-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Scripting
1