General
-
Target
c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e.xlsx
-
Size
56KB
-
Sample
240403-t8egfafe81
-
MD5
950c7daa701f5f4bbb3fc72ce1d003f0
-
SHA1
396be2776d4625b386a3ff4dcce8d840e1e2e3de
-
SHA256
c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e
-
SHA512
9d192f5a701cb81fb2e0f7054a82e1629ff6b832066277dfe108a940b39f680deba2e1ffbb49b77468b2d5a534650aa68107a0376efd9851bfddf484204a445d
-
SSDEEP
768:ZFSadDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq51s5:LZ2u4OPKIxoEuDKJnlqs5
Static task
static1
Behavioral task
behavioral1
Sample
c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e.xlsx
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
irreceiver.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
zvRxAJTe
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e.xlsx
-
Size
56KB
-
MD5
950c7daa701f5f4bbb3fc72ce1d003f0
-
SHA1
396be2776d4625b386a3ff4dcce8d840e1e2e3de
-
SHA256
c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e
-
SHA512
9d192f5a701cb81fb2e0f7054a82e1629ff6b832066277dfe108a940b39f680deba2e1ffbb49b77468b2d5a534650aa68107a0376efd9851bfddf484204a445d
-
SSDEEP
768:ZFSadDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq51s5:LZ2u4OPKIxoEuDKJnlqs5
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-