General

  • Target

    3dfde1b581593a96e9bb4370d492897dc681d1ea7028466c3c691b1032da515f

  • Size

    433KB

  • MD5

    4915624a44644b10d71340ac800d08c2

  • SHA1

    4f9269a77670c0012575814349cf6351676b8620

  • SHA256

    3dfde1b581593a96e9bb4370d492897dc681d1ea7028466c3c691b1032da515f

  • SHA512

    b99ff9709e22ee7c980bc752de8aacf4e2c9ab19b4363db3bb9e0a96c40a13695f48a68e38727dbae7b9bf293f89a95eb20791bb91017eae1a40b1bacfcd922b

  • SSDEEP

    12288:3Wy/dWy8VGJcix+d/WS8/Ruv0d5J/zW+hAxqnup/2:3p1p8V0x+d/WS8Hd/W+hAx+uJ2

Score
10/10

Malware Config

Extracted

Family

darkgate

Version



C2

http://lampixx.hopto.org

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    61689

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    true

  • crypto_key

    raKqdORtLcYsWG

  • internal_mutex

    pIzEhw

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    20

  • rootkit

    true

  • startup_persistence

    true

Signatures

  • Darkgate family
  • Detect DarkGate stealer 1 IoCs
  • Detect executables referencing considerable number of Ads blocking browser extension IDs 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3dfde1b581593a96e9bb4370d492897dc681d1ea7028466c3c691b1032da515f
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections