General
-
Target
0cdf89055417947a9ad53cf38eb0f75e.exe
-
Size
158KB
-
Sample
240626-g1gwdazbqd
-
MD5
0cdf89055417947a9ad53cf38eb0f75e
-
SHA1
a6d845cd643409201b603f3918c4c45b9afb8111
-
SHA256
3b949e360f85236eb66eafa4eeda2ffffb0fb01562767550e75dfb4bf09f0eaf
-
SHA512
8a2523617d4f3c68bd76c9c6f9da358d933b5e71312e25c8ce3a095c3225ba2abea0873ba0c895dea7c374346d3cda5a030557a895b990f1d7a623adb2d2aa20
-
SSDEEP
3072:hQH5iOMxGNftsLz4oPFKUQgC6OEYkUjUMNW82QZRaop5:hQNMxGNVwtB7OEAoWRa
Behavioral task
behavioral1
Sample
0cdf89055417947a9ad53cf38eb0f75e.exe
Resource
win7-20240611-en
Malware Config
Extracted
stealc
3
http://93.123.39.132
-
url_path
/129edec4272dc2c8.php
Extracted
darkgate
2newn2newn2new
applylawofattraction.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
vhOtpdAB
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
2newn2newn2new
Targets
-
-
Target
0cdf89055417947a9ad53cf38eb0f75e.exe
-
Size
158KB
-
MD5
0cdf89055417947a9ad53cf38eb0f75e
-
SHA1
a6d845cd643409201b603f3918c4c45b9afb8111
-
SHA256
3b949e360f85236eb66eafa4eeda2ffffb0fb01562767550e75dfb4bf09f0eaf
-
SHA512
8a2523617d4f3c68bd76c9c6f9da358d933b5e71312e25c8ce3a095c3225ba2abea0873ba0c895dea7c374346d3cda5a030557a895b990f1d7a623adb2d2aa20
-
SSDEEP
3072:hQH5iOMxGNftsLz4oPFKUQgC6OEYkUjUMNW82QZRaop5:hQNMxGNVwtB7OEAoWRa
-
Detect DarkGate stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-