General
-
Target
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939.zip
-
Size
1.4MB
-
Sample
240806-27rdlstdrj
-
MD5
1ab36effa4f01d87f69174dee4b3f86f
-
SHA1
b6d810485c941e7484758cdb561f0124cefb41a0
-
SHA256
de4a0c6b99ba22e3977f0541be90031ddf5cb278333f293d8a5c7ea08cd33a14
-
SHA512
c120cff20810e9010b80a18f0ac5642473d7110d7b94a68976135d73eda8e08579a2e096371b1f16cf53f040bc63a73e37962a4d5e2179a69cd3367dc9df1c36
-
SSDEEP
24576:qBVrec8W+GWTiHhKeBqo9HqbzG7xO6WaSF6n+dC+Ddo0rB+tzLxxUWcHZ24EEX/s:qBccxVWTiQ0KbzG7xNSP90FvC524EEXE
Static task
static1
Behavioral task
behavioral1
Sample
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939.exe
Resource
win7-20240729-en
Malware Config
Extracted
darkgate
Gh0st
filetmoon.site
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
KaVpLvWD
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
Gh0st
Targets
-
-
Target
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
-
Size
2.1MB
-
MD5
fc99ddf185aa553bf30c431cc897c903
-
SHA1
72c3ae0ed953a4ed3a5d1d8e3957f530c952f48d
-
SHA256
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
-
SHA512
0be1916e9f0fa3ff2282bbfc23ac9c5f19c15c17f5e0e6aa68edea3db7b780c53f473d40292f0ed324596996572917dfe584cc2d989773c77ee489b643dd2e46
-
SSDEEP
49152:Uk8BMMcyO6uzNJbIdNJbnwppkcWAta0PH1i:HasZ6uJJb6UJNa0
-
Detect DarkGate stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-