General
-
Target
75d89fd4aa29e97e8859bdf734602490da0f90a4fd5213f737857d971c82e80c.zip
-
Size
777KB
-
Sample
240417-pcq35sec42
-
MD5
60817831fc3ea259d45c9a537172f080
-
SHA1
bc6be7d44565b13e1008a3b962abc9bc6ee44217
-
SHA256
75d89fd4aa29e97e8859bdf734602490da0f90a4fd5213f737857d971c82e80c
-
SHA512
02fc5b1202897e0d1d99ff636ab43b9d4bb6335f1fc538bd63d361b4025584f8196504f4366668dc919c1c8cb52eea3742fdf8746748dae00bef4af0c606ebdd
-
SSDEEP
24576:iDv3cPduvcaRMi59YF7neQfxdIhjRT2Wrp:ij9kBi7kLeQydT2Wrp
Static task
static1
Behavioral task
behavioral1
Sample
AutoHotkey.exe
Resource
win7-20240221-en
Malware Config
Extracted
darkgate
admin888
backupssupport.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
rNDPYLnH
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
AutoHotkey.exe
-
Size
892KB
-
MD5
a59a2d3e5dda7aca6ec879263aa42fd3
-
SHA1
312d496ec90eb30d5319307d47bfef602b6b8c6c
-
SHA256
897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb
-
SHA512
852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030
-
SSDEEP
24576:bGzl9+a4Ne1nEFI56xU+0IdY2Zv952uetfbFEzP4UFhOt:b+tOWnEFZR0El0JEzQAh
-
Detect DarkGate stealer
-