General
-
Target
19062024_0932_seo_cr1.exe
-
Size
3.8MB
-
Sample
240619-lhr1vaxhjb
-
MD5
b2d33941295f236bebee0d3c389a8549
-
SHA1
76bfc480242219d14cfbbb8dd7628c3c9bde7f7d
-
SHA256
cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c
-
SHA512
c7a8a877a93590876221c9bf0c21e04b78a8a8af415c1a70c776744702d3442aa9ffab2d480cc5d6f78a444d74ed3b6eac0407f6b571ddd02e63058d5386aae4
-
SSDEEP
24576:VUFFAjGxqL+VD3crlj8XR2GN19yK9fbxjSXIQ8j0b4qsfQ9Mrm94+CJWMD/NXChu:NKUo3klIXhNryuI2j0sVf9
Static task
static1
Behavioral task
behavioral1
Sample
19062024_0932_seo_cr1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19062024_0932_seo_cr1.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
darkgate
x6x6x7x77xx6x6x67
dr-networks.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
rbQZFzKA
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
x6x6x7x77xx6x6x67
Targets
-
-
Target
19062024_0932_seo_cr1.exe
-
Size
3.8MB
-
MD5
b2d33941295f236bebee0d3c389a8549
-
SHA1
76bfc480242219d14cfbbb8dd7628c3c9bde7f7d
-
SHA256
cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c
-
SHA512
c7a8a877a93590876221c9bf0c21e04b78a8a8af415c1a70c776744702d3442aa9ffab2d480cc5d6f78a444d74ed3b6eac0407f6b571ddd02e63058d5386aae4
-
SSDEEP
24576:VUFFAjGxqL+VD3crlj8XR2GN19yK9fbxjSXIQ8j0b4qsfQ9Mrm94+CJWMD/NXChu:NKUo3klIXhNryuI2j0sVf9
Score10/10-
Detect DarkGate stealer
-
Executes dropped EXE
-
Loads dropped DLL
-