General
-
Target
statapril2024-5892.xlsx
-
Size
56KB
-
Sample
240409-yrkpcagg73
-
MD5
25f201c3b20150d61623fb8c06402eae
-
SHA1
81045db4d69c571e3839260ec3bbe68d214ca43f
-
SHA256
4721df75d7bb85128d6968110264e5e5054f68d30703421bb0e120424c838157
-
SHA512
eca67412e299d09db028022b7f472a39261795e623a4ddcd98a66c322c482e8a8e10321475f92791f321caf4cfba3db85ffa9e0452bc78f1d411cb45414fc175
-
SSDEEP
768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5ke:/mZ2u4OPKIxoEuDKJnlve
Static task
static1
Malware Config
Extracted
darkgate
admin888
103.124.106.237
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
bedxvHpr
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
statapril2024-5892.xlsx
-
Size
56KB
-
MD5
25f201c3b20150d61623fb8c06402eae
-
SHA1
81045db4d69c571e3839260ec3bbe68d214ca43f
-
SHA256
4721df75d7bb85128d6968110264e5e5054f68d30703421bb0e120424c838157
-
SHA512
eca67412e299d09db028022b7f472a39261795e623a4ddcd98a66c322c482e8a8e10321475f92791f321caf4cfba3db85ffa9e0452bc78f1d411cb45414fc175
-
SSDEEP
768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5ke:/mZ2u4OPKIxoEuDKJnlve
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Executes dropped EXE
-