General
-
Target
1927c89e8514cc8d7516d4513331a6c461d00547d107ffb7985742c46806f8f5.zip
-
Size
1.9MB
-
Sample
240402-l6zetsef77
-
MD5
13794bb4212b8b7ca5663bf03a3ab81b
-
SHA1
41efb6673f8e4fc5eab85981f410d555d76d5363
-
SHA256
8f866fef2619766bce17ac5b1fb3c6a30f9251877ac856b3614fb5b8ac185109
-
SHA512
c7f00242933a499f14793dabebe7b7cafd2c84ae5b771c9f7808984c80980be606a090eb3ed504a2563a01927eded70ee38736bc4a14c2cf627ee2b49183dc42
-
SSDEEP
49152:aTxYH6+sF5+ypTFxAzZVIf5FtOSaNokb1o1NQrEC8s:g+bQTcXBSKtb1o31C8s
Static task
static1
Behavioral task
behavioral1
Sample
1927c89e8514cc8d7516d4513331a6c461d00547d107ffb7985742c46806f8f5.msi
Resource
win7-20231129-en
Malware Config
Extracted
darkgate
admin888
newdomainfortesteenestle.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
false
-
c2_port
443
-
check_disk
false
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
ZLhPAWah
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
false
-
username
admin888
Targets
-
-
Target
1927c89e8514cc8d7516d4513331a6c461d00547d107ffb7985742c46806f8f5.msi
-
Size
4.3MB
-
MD5
693c4acd02bea0abe6223a62dc2d4016
-
SHA1
d8f49b7896fb4e93cdb9602d604538cbdec2d043
-
SHA256
1927c89e8514cc8d7516d4513331a6c461d00547d107ffb7985742c46806f8f5
-
SHA512
435fb4c18e48a359b031c0c94d9cb31c49f4fff04b2df53ed3c29373446edca937f1af81d444d2199a505816ec9cc81a5bbf0ac5f6fb07bffb05f1a4182bfdbb
-
SSDEEP
49152:ApUPZ9qhCxzT+WKjSXBuX/MDiypVytj5hgleknccaUBj6oz0aHxAiToxZyiWtB96:ApOCQk/K6hgg4HomJ
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-