General
-
Target
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.zip
-
Size
2.2MB
-
Sample
240402-l658daec4y
-
MD5
a16ed839c65ba4826212ee3b13bbaa17
-
SHA1
b44ff498d9a9cdeb21db8f9e6d35185bef6aed3b
-
SHA256
055dc72cd2af80398db4c677048d824d8aeae6da33a1b0e2901a9730e68ba9b9
-
SHA512
d87c2b0912eddba151913ec543bd707e3b7d0731c5249c8683a870c3c82322864749e3ad2541f240a9934c1a1828b78b84e8753f6eeaf6c3fa8f78c713d58b65
-
SSDEEP
49152:Xntth2xNBMBBaESleiUfbViMYNkNyet6m2MbScNstlMVhmkwp:Xntt4rBMBRTEObclVcN/mJ
Static task
static1
Behavioral task
behavioral1
Sample
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi
Resource
win7-20231129-en
Malware Config
Extracted
darkgate
admin888
stachmentsuprimeresult.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
443
-
check_disk
false
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
veVumtze
-
minimum_disk
30
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi
-
Size
4.3MB
-
MD5
b88352bde539f79207be209759505f02
-
SHA1
8ede7ee0a43c4282b41687408ddc38a243ac4bfd
-
SHA256
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112
-
SHA512
104d4330c05e41d2039a0b61438565c88138ec9b2c55632ab0ec8eaf70840b095e1dd5bb5d55b65373099df80896632499ff5b3c85240d7a389824cb72268921
-
SSDEEP
49152:zpUPB9qhCxzT+WKjSX15zLVI4vLeY9xV4qtGvmKBteU5oBgffUBS88qAU8:zpECQ1FLeYLVTV4WMVf
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-