General
-
Target
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96
-
Size
7.4MB
-
Sample
240708-kjss4atbma
-
MD5
16581e7a3a1404348f405f354c4a7ddf
-
SHA1
30a78e401af4800e77d1cb37a01ba73df10a88ca
-
SHA256
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96
-
SHA512
5eb6e546dd04e42bf412735d9884df5ecf565fa91aa7246c80d35dce26191b4be405d7b49fb1b849645fb60a1ea498452c8e0911075a2ee0d32aba0a80e0fe96
-
SSDEEP
98304:WkOfXFkZa7mEh3liXUxV07VWhlRg3jAnC5Hc4UVG1:eXFkZaj3liXUxV07VWhlRIAC5HEY
Static task
static1
Behavioral task
behavioral1
Sample
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
darkgate
trafikk897612561
45.11.59.87
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
hFlKeAto
-
minimum_disk
100
-
minimum_ram
4095
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
trafikk897612561
Targets
-
-
Target
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96
-
Size
7.4MB
-
MD5
16581e7a3a1404348f405f354c4a7ddf
-
SHA1
30a78e401af4800e77d1cb37a01ba73df10a88ca
-
SHA256
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96
-
SHA512
5eb6e546dd04e42bf412735d9884df5ecf565fa91aa7246c80d35dce26191b4be405d7b49fb1b849645fb60a1ea498452c8e0911075a2ee0d32aba0a80e0fe96
-
SSDEEP
98304:WkOfXFkZa7mEh3liXUxV07VWhlRg3jAnC5Hc4UVG1:eXFkZaj3liXUxV07VWhlRIAC5HEY
Score10/10-
Detect DarkGate stealer
-
Executes dropped EXE
-
Loads dropped DLL
-