General
-
Target
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.zip
-
Size
1.8MB
-
Sample
240402-qew8lsbb37
-
MD5
a266eaf8156ad77ef5975ea8e69f38d8
-
SHA1
83e70c98bf8844637ec5676b68de5002fc2b62a3
-
SHA256
a44d795eed6cf34cb675840b6c30448fad7a88b65e213bc8ae69a8bc8f77ced2
-
SHA512
5accf50f85fdff4dcd92440c939575884459b64f10c1096166deb021750de73ff4cdbd129065d024f81b241a7b3624719924e8083391b9bb8691a496f0679031
-
SSDEEP
49152:U0078MglzC5RsMJCnD1n+Yt8aQ7EbKGaZRu1Yq:/MEzC5qdD1nv1YZuYq
Static task
static1
Behavioral task
behavioral1
Sample
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
Resource
win7-20240319-en
Malware Config
Extracted
darkgate
admin888
rourtmanjsdadhfakja.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
eXAWVDek
-
minimum_disk
50
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
-
Size
3.9MB
-
MD5
54c2f6b177e71ec4c262930566a282d1
-
SHA1
b39e90c76e1fb6e4dc6f2d4ed034ba7b9c82bf23
-
SHA256
3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848
-
SHA512
7b84d5784626707e808bc7a8e0b15fb23f7faf3dc77e3aa720a18e89e494c98850b1b6de52b25f43463e5a39aac2db1edebbd6c891976d89facd1f775cf16e43
-
SSDEEP
49152:0pUPBhGczyqOSKGLcLxxYuYLRlJ7lzkiBVlR3/BzuAPeJx3B+JLil:0pUqM9LDEKXVuAPMuW
-
Detect DarkGate stealer
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-