General
-
Target
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939.zip
-
Size
1.4MB
-
Sample
240807-ewpz3svajg
-
MD5
03c73e5752332706c38a29d744990352
-
SHA1
9532bff6a26a37f1c3d6dbee92f6aaff659853c2
-
SHA256
9c3c4a9c67ce010496bc641249b6e67a2e430c9813e1bb55d2970f843cf087ad
-
SHA512
865161004deb47d3f11c6c1b00785e62bd62de00c5f8546f2e64f07139c3e2d449dc2b7429870ac078a78442efa13fd635e12d2d8f25a5427f25323ec75d7d0e
-
SSDEEP
24576:QBKR2HYlOnrqKDynuFTwtTzyiMXUk2+ldmC8MphvJ+JHUo3MceDif70G1byVLtzi:QBjrqMybnyiMXUk53mCB+J0o3Mc1706N
Static task
static1
Behavioral task
behavioral1
Sample
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkgate
Gh0st
filetmoon.site
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
KaVpLvWD
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
Gh0st
Targets
-
-
Target
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
-
Size
2.1MB
-
MD5
fc99ddf185aa553bf30c431cc897c903
-
SHA1
72c3ae0ed953a4ed3a5d1d8e3957f530c952f48d
-
SHA256
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
-
SHA512
0be1916e9f0fa3ff2282bbfc23ac9c5f19c15c17f5e0e6aa68edea3db7b780c53f473d40292f0ed324596996572917dfe584cc2d989773c77ee489b643dd2e46
-
SSDEEP
49152:Uk8BMMcyO6uzNJbIdNJbnwppkcWAta0PH1i:HasZ6uJJb6UJNa0
-
Detect DarkGate stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-