General
-
Target
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.zip
-
Size
1.8MB
-
Sample
240402-mpff3afc8x
-
MD5
4cd516f6931d49c3430d8e67f43ca6c0
-
SHA1
b0a0c4c6853c2fde907becb455ab0cf9aaa5e138
-
SHA256
8f65651b2b2cb2734d8be88d5eee7199b51f116c0435d2e543b947dc2343d5e9
-
SHA512
65ebfa331d9e5c8f0e0cb26ddd280cb677d09d6a27c8dd7acf64b2cec643d7f01c84cfe46967af79273f124b5d66ed6551745a685804028e93b9a4b557887fdb
-
SSDEEP
49152:aUSZBX8vIO49fvUjoj3sIkr6aMeGXakrsxg9:HIJ9XMG3lkrzM1Xbsxg9
Static task
static1
Behavioral task
behavioral1
Sample
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
Resource
win7-20240220-en
Malware Config
Extracted
darkgate
admin888
rourtmanjsdadhfakja.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
eXAWVDek
-
minimum_disk
50
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
-
Size
3.9MB
-
MD5
54c2f6b177e71ec4c262930566a282d1
-
SHA1
b39e90c76e1fb6e4dc6f2d4ed034ba7b9c82bf23
-
SHA256
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848
-
SHA512
7b84d5784626707e808bc7a8e0b15fb23f7faf3dc77e3aa720a18e89e494c98850b1b6de52b25f43463e5a39aac2db1edebbd6c891976d89facd1f775cf16e43
-
SSDEEP
49152:0pUPBhGczyqOSKGLcLxxYuYLRlJ7lzkiBVlR3/BzuAPeJx3B+JLil:0pUqM9LDEKXVuAPMuW
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-