General
-
Target
nxcxgekw.ps1
-
Size
596B
-
Sample
240404-sppydsbf97
-
MD5
40d4e31bc0a65dda584890fc09c939c7
-
SHA1
531b883c8bbf84dd7e22493b324b384ee2f60047
-
SHA256
ae81a758cb103d6b9c8495930c1478812ee57655b820be2558c1a7d81f4713c8
-
SHA512
ab0cf1333cfd050bccf6efb47830c3b4339ab26444c407dae134991c4423181ba131e2e2b84ded6bd1828b1ac2d338dcdb80ebf8cb8af524f66f74278e49d0b6
Static task
static1
Behavioral task
behavioral1
Sample
nxcxgekw.ps1
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
irreceiver.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
KDUnnHQJ
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
nxcxgekw.ps1
-
Size
596B
-
MD5
40d4e31bc0a65dda584890fc09c939c7
-
SHA1
531b883c8bbf84dd7e22493b324b384ee2f60047
-
SHA256
ae81a758cb103d6b9c8495930c1478812ee57655b820be2558c1a7d81f4713c8
-
SHA512
ab0cf1333cfd050bccf6efb47830c3b4339ab26444c407dae134991c4423181ba131e2e2b84ded6bd1828b1ac2d338dcdb80ebf8cb8af524f66f74278e49d0b6
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Executes dropped EXE
-