General
-
Target
01072024_0634_archive.zip
-
Size
767KB
-
Sample
240701-hbw5faybne
-
MD5
d0ab2c86275c0d2c0e2ec0456032342e
-
SHA1
de27534524692ca0811e625b6ec14036a15b7a13
-
SHA256
8b632cc2a53bbc6de63bf25151dc644cdfd6eb9baf5dff9ab91594eeaee8e598
-
SHA512
deb4ab14d928420b61cec814420b2cd41f05dc3b69307f2884b2d1f922b0ee330dcceeec642bcf9f60701471f942a670efda45c2e489e680b66d62cda589d518
-
SSDEEP
12288:Is2U8YVU/eDv2i0qpqYBEBIEr8tBXcTgPBUgDZymRfSwyPl291unR15I3WpOYx:IsJBgav2i0qpqYBEmjXMmBUgDZtUwyPV
Static task
static1
Behavioral task
behavioral1
Sample
Autoit3.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Autoit3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
index.cmd
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
index.cmd
Resource
win10v2004-20240508-en
Malware Config
Extracted
darkgate
trafikk897612561
45.11.59.81
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
QOjojiwc
-
minimum_disk
100
-
minimum_ram
4095
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
trafikk897612561
Targets
-
-
Target
Autoit3.exe
-
Size
872KB
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
-
SHA1
2a4062e10a5de813f5688221dbeb3f3ff33eb417
-
SHA256
237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
-
SHA512
195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
SSDEEP
12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
Score3/10 -
-
-
Target
index.cmd
-
Size
26B
-
MD5
e111e5f66ecb1318ce9f10d52552bca9
-
SHA1
734f9c72e4e90ce67eb34fc7b372a676c3f4b1a2
-
SHA256
c4a8c37c1edca2eb1e6140c7b72283591e016f0a17231ea283c67eebbbbbe545
-
SHA512
6c66fc8280ada0f1f16f940e621a5b075260adc4bb7e6d70188eca90eb391334ea9471334cec90ec6c0d215731d6c67020f9acf0e551a6f14b1db248ad8d8f43
Score10/10-
Detect DarkGate stealer
-