General
-
Target
4_10_AC-3010.xlsx
-
Size
51KB
-
Sample
240410-w88fmagb53
-
MD5
7c265753eddf8443ad04c994b063f622
-
SHA1
a770cd22f58c78979d689f1db45ec05973e2d815
-
SHA256
c0bdda3b38fb62f8de43d24640c8db5f0e883836d704041dd1f7c338f2709d02
-
SHA512
7aacf817f45072c20e27f544e1f9464a3db0849a7797fe9a247455c9301c16af3077b45729da03b731c2cc1a75c7d29717abc8e0515511336067da829167a10e
-
SSDEEP
1536:4s1eZDHgM8v42wkYq84lKL7IAnA4xCQH140sXe:V1eZcMetF8T7IAA4xprsu
Static task
static1
Malware Config
Extracted
darkgate
admin888
wassonite.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
jdfEdKYT
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
4_10_AC-3010.xlsx
-
Size
51KB
-
MD5
7c265753eddf8443ad04c994b063f622
-
SHA1
a770cd22f58c78979d689f1db45ec05973e2d815
-
SHA256
c0bdda3b38fb62f8de43d24640c8db5f0e883836d704041dd1f7c338f2709d02
-
SHA512
7aacf817f45072c20e27f544e1f9464a3db0849a7797fe9a247455c9301c16af3077b45729da03b731c2cc1a75c7d29717abc8e0515511336067da829167a10e
-
SSDEEP
1536:4s1eZDHgM8v42wkYq84lKL7IAnA4xCQH140sXe:V1eZcMetF8T7IAA4xprsu
-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Executes dropped EXE
-