General
-
Target
004dc00f66098d37167a52a7fc0814f497d30814dc00a8da7083a4765510d79a.zip
-
Size
2.2MB
-
Sample
240402-l6ytaseb9t
-
MD5
813aa64b61a22ff7d14b57d0b0559d7d
-
SHA1
9343a35f1b8746a033edfba727cc36e951518ded
-
SHA256
7e99bf5d7c7c1386475d0d8dad5872b77643505cb5ccd2f76b5a69fb2007f3fa
-
SHA512
97e0bf7e24fd963d59567a2b1adbfbfde00050d8b041d4351aefa39dbc3b9fe10bf7f7806abd5f79d2ad6242a90b3ff77a67c27b58ef30a939e03698490d013f
-
SSDEEP
49152:l5FU5fB4BDigi9QWjAQ+XW7VjLrI6pTYCWDbq4e9nWy3phQF:3G6dRiGWjAQyW7VvrriDOXnWy3phI
Static task
static1
Behavioral task
behavioral1
Sample
pullofmaster.msi
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
stachmentsuprimeresult.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
443
-
check_disk
false
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
veVumtze
-
minimum_disk
30
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
pullofmaster.msi
-
Size
4.3MB
-
MD5
b88352bde539f79207be209759505f02
-
SHA1
8ede7ee0a43c4282b41687408ddc38a243ac4bfd
-
SHA256
fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112
-
SHA512
104d4330c05e41d2039a0b61438565c88138ec9b2c55632ab0ec8eaf70840b095e1dd5bb5d55b65373099df80896632499ff5b3c85240d7a389824cb72268921
-
SSDEEP
49152:zpUPB9qhCxzT+WKjSX15zLVI4vLeY9xV4qtGvmKBteU5oBgffUBS88qAU8:zpECQ1FLeYLVTV4WMVf
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-