General
-
Target
5e5611abfe988bec0e8f9fc012243add.bin
-
Size
3.0MB
-
Sample
240720-bqsbgazekj
-
MD5
143e16b7de5260f92f2f46ffb9b941c0
-
SHA1
0dcdd0cfeb381cfd6beab4c551de5d2aed268129
-
SHA256
8fb0dc2dbab60012204f90d70f70a8b9bdca634438ac99037076d3ced9c2920e
-
SHA512
85da9fd713d52fba136fdf7fea36dcf4fd8f4df03d20cff3c591dae01926cd1daec337e04a503d7f087c0ea143a06834e6073b8245b6a6a60781ecfeaebfbe2c
-
SSDEEP
49152:ePyhtDOmQn2aFx6gfLcdU0+Fi+Or3dY3cfEFbnioV7VAhjDvIsv+2cgIwrd5:ePUtDBVi0+seyebioVqy5gnd5
Static task
static1
Behavioral task
behavioral1
Sample
ec61895ef8af01ff00970e46f7ba98c24bf9079d71e09d3c18576f1a9efc93c2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ec61895ef8af01ff00970e46f7ba98c24bf9079d71e09d3c18576f1a9efc93c2.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
darkgate
trafikk897612561
91.222.175.250
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
crrZYSEf
-
minimum_disk
100
-
minimum_ram
4095
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
trafikk897612561
Targets
-
-
Target
ec61895ef8af01ff00970e46f7ba98c24bf9079d71e09d3c18576f1a9efc93c2.exe
-
Size
7.9MB
-
MD5
5e5611abfe988bec0e8f9fc012243add
-
SHA1
8e28dd1b33a954dafc7d678b8e67c41cfe8bc0b7
-
SHA256
ec61895ef8af01ff00970e46f7ba98c24bf9079d71e09d3c18576f1a9efc93c2
-
SHA512
3d9636680d86bc918bded4882d5c717c698188104b7fdb1f28db67da29c95897bb0dc12d844cfe6b4e843f48b09e59c34edde4fb920aa67fbcc0794176794dc3
-
SSDEEP
98304:r+oXX33dpwZDEVM1h5N2cnkk/J4Sf6Qq68:ya3LwZbh/Zyb
Score10/10-
Detect DarkGate stealer
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-