General
-
Target
38c2831d236cca17e7a907073eb60c718ca0ab35cbaf71bc63bf8d45b74deb2b
-
Size
193KB
-
Sample
240417-qwv2wabd8t
-
MD5
d913f0f2e2905fb8029d6e0ac804d43d
-
SHA1
88999854ba2a703fc17e72fb11907772b9f55b49
-
SHA256
38c2831d236cca17e7a907073eb60c718ca0ab35cbaf71bc63bf8d45b74deb2b
-
SHA512
f37393c4dd3613e8992db4f809154cdd6ebe6e95668ae72326d9a7ad2b641aba99bb28f79b8c71896eb1a32c4a73b0b959da2fa02437751ded36405798ab1d97
-
SSDEEP
6144:Jrexotjn/ZkddkO+HQn4zF6rVkkNspShb:JyK1xkYO+HQnNZ9sQ
Behavioral task
behavioral1
Sample
c36f35e271e0e7c345ca701c782605a2f899aa6f30f13d06ab7541244c8a8229.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c36f35e271e0e7c345ca701c782605a2f899aa6f30f13d06ab7541244c8a8229.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
darkgate
5.2.4
civilian1337
http://185.130.227.202
-
alternative_c2_port
8080
-
anti_analysis
false
-
anti_debug
true
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
true
-
crypto_key
VPsTDMdPronzYs
-
internal_mutex
txtMut
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
civilian1337
Targets
-
-
Target
c36f35e271e0e7c345ca701c782605a2f899aa6f30f13d06ab7541244c8a8229.exe
-
Size
405KB
-
MD5
52fc04a1017bff949d2531942491e7d9
-
SHA1
0f23ac4f5dc0603894374026349d7db0f870ee91
-
SHA256
c36f35e271e0e7c345ca701c782605a2f899aa6f30f13d06ab7541244c8a8229
-
SHA512
920905dc5d7c25daf2ba38daeeeab8ffe883023905ecb166f585346b012caeb3629e12400ca0df4c24e23d2abdea8081f7272d3b1385121ffc301f2982a10c85
-
SSDEEP
12288:0UEpOEWzuYzy/Bda9AlxhwcySTcth/4N:0fOEWjyZda9uhwlSIf4
Score10/10-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-