General
-
Target
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29.exe
-
Size
3.2MB
-
Sample
240704-bmw59ayake
-
MD5
4b362951de01e8de774ff98d1fcd04ce
-
SHA1
5b433fe0dbd449f6a04388fade733f0d1d250252
-
SHA256
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29
-
SHA512
5f1d793e930374fbf3b5cca767605a7ee2cfd48d95eea4f273e7a70e043c19dae3669ab471ec2d0a98d9454eb6edc83ec5335918c26190e04de6770642e1628e
-
SSDEEP
49152:dsjxBrEi/YD4ocuJ5txUJGvSEmrxlbTT1zVIZZpEkQuPQLAkOWMuG8lAKRRmxvIy:dsjxBrEMYD4ocuEbr1yZERuYLi/imKNE
Static task
static1
Behavioral task
behavioral1
Sample
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
darkgate
trafikk897612561
91.222.173.204
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WRYOnwPR
-
minimum_disk
100
-
minimum_ram
4095
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
trafikk897612561
Targets
-
-
Target
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29.exe
-
Size
3.2MB
-
MD5
4b362951de01e8de774ff98d1fcd04ce
-
SHA1
5b433fe0dbd449f6a04388fade733f0d1d250252
-
SHA256
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29
-
SHA512
5f1d793e930374fbf3b5cca767605a7ee2cfd48d95eea4f273e7a70e043c19dae3669ab471ec2d0a98d9454eb6edc83ec5335918c26190e04de6770642e1628e
-
SSDEEP
49152:dsjxBrEi/YD4ocuJ5txUJGvSEmrxlbTT1zVIZZpEkQuPQLAkOWMuG8lAKRRmxvIy:dsjxBrEMYD4ocuEbr1yZERuYLi/imKNE
Score10/10-
Detect DarkGate stealer
-
Executes dropped EXE
-
Loads dropped DLL
-