General
-
Target
statapril2024-1353.xlsx
-
Size
56KB
-
Sample
240409-sdxh4ade6w
-
MD5
d1565887c88e31fe8de1d68832f52bb9
-
SHA1
580731aa5c735a3051883cbabc1b36c63fdc4bcd
-
SHA256
6a20b1568c0edaede64a58f2843b68a6a098cc99bd4554c7bfc339bfb4d67338
-
SHA512
8e7fecb175eb507d3468b645a8474eaa4c0518832b32328dbf949c1f1adbb821d43a82103d539e71b259232457ad16d6a33e80d819b078ea34e4fa9c797b47a4
-
SSDEEP
768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5ndm:/mZ2u4OPKIxoEuDKJnlCm
Static task
static1
Behavioral task
behavioral1
Sample
statapril2024-1353.xlsx
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
103.124.106.237
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
bedxvHpr
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
statapril2024-1353.xlsx
-
Size
56KB
-
MD5
d1565887c88e31fe8de1d68832f52bb9
-
SHA1
580731aa5c735a3051883cbabc1b36c63fdc4bcd
-
SHA256
6a20b1568c0edaede64a58f2843b68a6a098cc99bd4554c7bfc339bfb4d67338
-
SHA512
8e7fecb175eb507d3468b645a8474eaa4c0518832b32328dbf949c1f1adbb821d43a82103d539e71b259232457ad16d6a33e80d819b078ea34e4fa9c797b47a4
-
SSDEEP
768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5ndm:/mZ2u4OPKIxoEuDKJnlCm
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-