General
-
Target
75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14.unknown
-
Size
1KB
-
Sample
240417-b6vfrsbg7w
-
MD5
32f61baa669991fb989439babaf493ff
-
SHA1
4242d545077e3e643854e3148e00c8283533b9ab
-
SHA256
75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14
-
SHA512
d20bf0b9a664caa9e9fe18dcb3899182b8f8bbb0275907bec6e3e888c0d2cd36a17ba24c49a3b92910ee075e6309aef5b8cf9392acf5833d66c0fbdcd3fdc2df
Static task
static1
Behavioral task
behavioral1
Sample
75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14.vbs
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
backupssupport.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
rNDPYLnH
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14.unknown
-
Size
1KB
-
MD5
32f61baa669991fb989439babaf493ff
-
SHA1
4242d545077e3e643854e3148e00c8283533b9ab
-
SHA256
75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14
-
SHA512
d20bf0b9a664caa9e9fe18dcb3899182b8f8bbb0275907bec6e3e888c0d2cd36a17ba24c49a3b92910ee075e6309aef5b8cf9392acf5833d66c0fbdcd3fdc2df
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-