General
-
Target
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29.zip
-
Size
1.9MB
-
Sample
240703-xj48cavcmc
-
MD5
04681d528fb8e705938a6f766755a507
-
SHA1
d611652dcbed2d42aa625b697d2cf857e4c934d7
-
SHA256
7efe3d0468dfa552b8f13ac7237f288790c0b205c90e547e8518114d447ad21a
-
SHA512
c9d4bc0f835b3e3aad18337e32859d67ebc339881f0fb8766054d458a60ad08227b1c84ee006f078fb6c9143da039c117cf2cf83100cca04852e37b44f528650
-
SSDEEP
49152:Z2G0Aa3rT3w815uDizSy2ElPZsg4eQ0JqRgDwk1mhSXHg:Z2d3rlui1VB4eQ0OgDwT6Hg
Static task
static1
Behavioral task
behavioral1
Sample
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
darkgate
trafikk897612561
91.222.173.204
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WRYOnwPR
-
minimum_disk
100
-
minimum_ram
4095
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
trafikk897612561
Targets
-
-
Target
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29.exe
-
Size
3.2MB
-
MD5
4b362951de01e8de774ff98d1fcd04ce
-
SHA1
5b433fe0dbd449f6a04388fade733f0d1d250252
-
SHA256
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29
-
SHA512
5f1d793e930374fbf3b5cca767605a7ee2cfd48d95eea4f273e7a70e043c19dae3669ab471ec2d0a98d9454eb6edc83ec5335918c26190e04de6770642e1628e
-
SSDEEP
49152:dsjxBrEi/YD4ocuJ5txUJGvSEmrxlbTT1zVIZZpEkQuPQLAkOWMuG8lAKRRmxvIy:dsjxBrEMYD4ocuEbr1yZERuYLi/imKNE
Score10/10-
Detect DarkGate stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-