General
-
Target
c4d82f8a16231351b6b38481721adf252db2b875bd3e01ec64b60564ccbca5dc
-
Size
1.4MB
-
Sample
240806-y7ywxatarc
-
MD5
13e143755f75724c462c46dadaa565d1
-
SHA1
e5d510d76ad305be66edc4b21d4c077b054d8f20
-
SHA256
c4d82f8a16231351b6b38481721adf252db2b875bd3e01ec64b60564ccbca5dc
-
SHA512
6d479300bb9649f7cb9bc80f4d7a3415063f893888c37aadf7d8a0c958950246df1d84aa5b61a9ece77b54b77542e559b22517c8b4017ec26e3ac80a21ccfb33
-
SSDEEP
24576:1/acGVm+490NfA+MEn11GVErLttr9U8rAInYGzB/XnZiUXYnYy55Zz:1/a7ZbBAcj3rLtLRAInJPZpYnYgZz
Static task
static1
Behavioral task
behavioral1
Sample
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
darkgate
Gh0st
filetmoon.site
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
KaVpLvWD
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
Gh0st
Targets
-
-
Target
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
-
Size
2.1MB
-
MD5
fc99ddf185aa553bf30c431cc897c903
-
SHA1
72c3ae0ed953a4ed3a5d1d8e3957f530c952f48d
-
SHA256
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
-
SHA512
0be1916e9f0fa3ff2282bbfc23ac9c5f19c15c17f5e0e6aa68edea3db7b780c53f473d40292f0ed324596996572917dfe584cc2d989773c77ee489b643dd2e46
-
SSDEEP
49152:Uk8BMMcyO6uzNJbIdNJbnwppkcWAta0PH1i:HasZ6uJJb6UJNa0
-
Detect DarkGate stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-