Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 01:54
Behavioral task
behavioral1
Sample
15052024_0154_darkgate_1405.exe
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
15052024_0154_darkgate_1405.exe
-
Size
451KB
-
MD5
a21b38b6116513bc2253e8bf86489ee4
-
SHA1
a1cf45cdc155d0c94548a49637f1e188898f87c7
-
SHA256
2466bd396fd49893a75de0042a43540e31382209d5dda5bb90983e0a4a6bca1f
-
SHA512
b7e344a5c2305c436c65d7285fdadca9eb62d07507419dc03c10cb1fcfbce75cba70fbf2cf3e34293c94fb2be63b0f7206c1e868e01f53305f1e2392a6fdd93a
-
SSDEEP
6144:COmtIXI7JMzHXaTigc2cNAjnypbreedTLvOh6oacTjMwQdV9U8OFCGQBe:7moI7gHqegc2GAjIveehYM/5U8C
Malware Config
Extracted
Family
darkgate
Botnet
admin888
C2
flexiblemaria.com
Attributes
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
rZyBgHHD
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 1 IoCs
resource yara_rule behavioral1/memory/2252-1-0x0000000000400000-0x0000000000476000-memory.dmp family_darkgate_v6 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 15052024_0154_darkgate_1405.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 15052024_0154_darkgate_1405.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2252 15052024_0154_darkgate_1405.exe