General
-
Target
statapril2024-7660.xlsx
-
Size
56KB
-
Sample
240410-nyw1vahg2x
-
MD5
ea31e71d72077ff13d6e8a1078e9d8dc
-
SHA1
eedbcfaaef25079d16483da44fc579bf3733733f
-
SHA256
5a7c4b8d40cd4d7c06f11d4226edd65b734f4a24a1158c5926add4993863f09e
-
SHA512
e27fb2b995ecdd9039759f6812653106d3ca2be19ee192fdba95083f36f2ea2f9d82ac5338c18fa564d4340fe18482e1aef06b6ca3197f51d08447e62de17fa9
-
SSDEEP
768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5gR:/mZ2u4OPKIxoEuDKJnlnR
Static task
static1
Behavioral task
behavioral1
Sample
statapril2024-7660.xlsx
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
103.124.106.237
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
bedxvHpr
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
statapril2024-7660.xlsx
-
Size
56KB
-
MD5
ea31e71d72077ff13d6e8a1078e9d8dc
-
SHA1
eedbcfaaef25079d16483da44fc579bf3733733f
-
SHA256
5a7c4b8d40cd4d7c06f11d4226edd65b734f4a24a1158c5926add4993863f09e
-
SHA512
e27fb2b995ecdd9039759f6812653106d3ca2be19ee192fdba95083f36f2ea2f9d82ac5338c18fa564d4340fe18482e1aef06b6ca3197f51d08447e62de17fa9
-
SSDEEP
768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5gR:/mZ2u4OPKIxoEuDKJnlnR
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-