General
-
Target
26-June-70204bf8.vbs
-
Size
2.7MB
-
Sample
240626-yry7qs1bnh
-
MD5
5a2e37b9f2732bbf0ca46e771e930a56
-
SHA1
e6b4a5373c88f1d98d232380d29cedb6fc3124e9
-
SHA256
9c0e3ceb7cccfb3c91e7b7f0e34ed8870fb9818d916f39c18c8501a4752e6401
-
SHA512
19fb487a91bf8c55fbf54b187af3bdae5c4c5d812265601231118d17570574bd07a02e1f36592def5a52b37231f2a993b2b5041b6738ab836da0de520c32269f
-
SSDEEP
49152:nwww8w0jjjGQx2g21XYYajjjKowa4hFpnwpwjRwSwDuBjjjRwfwBiNm:k
Static task
static1
Behavioral task
behavioral1
Sample
26-June-70204bf8.vbs
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26-June-70204bf8.vbs
Resource
win10v2004-20240508-en
Malware Config
Extracted
darkgate
trafikk897612561
91.222.173.170
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
GDrdcpJy
-
minimum_disk
100
-
minimum_ram
4095
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
trafikk897612561
Targets
-
-
Target
26-June-70204bf8.vbs
-
Size
2.7MB
-
MD5
5a2e37b9f2732bbf0ca46e771e930a56
-
SHA1
e6b4a5373c88f1d98d232380d29cedb6fc3124e9
-
SHA256
9c0e3ceb7cccfb3c91e7b7f0e34ed8870fb9818d916f39c18c8501a4752e6401
-
SHA512
19fb487a91bf8c55fbf54b187af3bdae5c4c5d812265601231118d17570574bd07a02e1f36592def5a52b37231f2a993b2b5041b6738ab836da0de520c32269f
-
SSDEEP
49152:nwww8w0jjjGQx2g21XYYajjjKowa4hFpnwpwjRwSwDuBjjjRwfwBiNm:k
Score10/10-
Detect DarkGate stealer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-