General
-
Target
dGate_protected_original.exe
-
Size
2.8MB
-
Sample
240408-zec96see6s
-
MD5
fe72d654aefd0130d01521580219a07f
-
SHA1
b8bc377832ebc9d835f7f931d6891af14172b7bf
-
SHA256
58cea3b2df8f9ae0675a783b829118bfdc48d46a95df0e326144336042eec272
-
SHA512
11c4a55e7ec962fd4784cbdfc69b0ff0f176c2042481eec6dce32b3dfbf7af825749777276092472b6447e146d1b01cbc7cba02e29a9eae24f407900913f7240
-
SSDEEP
49152:RfUQUuBCajuLSG2rhZmsPJcV7Cd+03PUk9M++ZpeLHcKFnvRseY:RiajuWGkZFc880PMppeLTFw
Behavioral task
behavioral1
Sample
dGate_protected_original.exe
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
seal1
193.142.146.203
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
AVUHIwtf
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
false
-
username
seal1
Targets
-
-
Target
dGate_protected_original.exe
-
Size
2.8MB
-
MD5
fe72d654aefd0130d01521580219a07f
-
SHA1
b8bc377832ebc9d835f7f931d6891af14172b7bf
-
SHA256
58cea3b2df8f9ae0675a783b829118bfdc48d46a95df0e326144336042eec272
-
SHA512
11c4a55e7ec962fd4784cbdfc69b0ff0f176c2042481eec6dce32b3dfbf7af825749777276092472b6447e146d1b01cbc7cba02e29a9eae24f407900913f7240
-
SSDEEP
49152:RfUQUuBCajuLSG2rhZmsPJcV7Cd+03PUk9M++ZpeLHcKFnvRseY:RiajuWGkZFc880PMppeLTFw
-
Detect DarkGate stealer
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-