Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 02:36
Behavioral task
behavioral1
Sample
09052024_0236_darkgate_0805.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
09052024_0236_darkgate_0805.exe
-
Size
461KB
-
MD5
2660fa00498401892568b298e626adda
-
SHA1
b3f78dc5563e945bc6e956db2bd67db284c2e541
-
SHA256
2e85a05c9a7c7a10c15e658baa7c2ed5d5eef533854e27af6d8eb342e1f81ac0
-
SHA512
8ab5bb085d9234207b8620bfebd8f64f0178df6c41e4dcbbd769d210a790e854ccfd82fc2c3509bfdc9e0eaf0886dd42f00d24ac060052d035406eb31567f966
-
SSDEEP
12288:UqilipcPNrKEj2R1zNAYFWtInQnqnVrM:UhljPNrKEjezNAYFQGC2
Malware Config
Extracted
Family
darkgate
Botnet
admin888
C2
kindupdates.com
Attributes
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
VjpTnzOY
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4532-1-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
09052024_0236_darkgate_0805.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 09052024_0236_darkgate_0805.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 09052024_0236_darkgate_0805.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
09052024_0236_darkgate_0805.exepid process 4532 09052024_0236_darkgate_0805.exe 4532 09052024_0236_darkgate_0805.exe